Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C123B09 second address: 000000006C123B0E instructions: 0x00000000 rdtsc 0x00000002 neg ax 0x00000005 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C1119ED second address: 000000006C111D4F instructions: 0x00000000 rdtsc 0x00000002 setl dh 0x00000005 call 00007F03F04CFE44h 0x0000000a mov edx, esp 0x0000000c mov dl, dh 0x0000000e call 00007F03F04CFE4Fh 0x00000013 push esp 0x00000014 xchg dword ptr [esp+08h], edi 0x00000018 mov dx, cx 0x0000001b jmp 00007F03F04CFE26h 0x0000001d xchg ecx, eax 0x0000001f not cx 0x00000022 lea edx, dword ptr [eax-3083F03Ah] 0x00000028 lea edi, dword ptr [edi+3Ch] 0x0000002b rcr dh, cl 0x0000002d mov ecx, eax 0x0000002f jmp 00007F03F04D00F4h 0x00000034 mov ax, dx 0x00000037 neg dh 0x00000039 xchg dword ptr [esp+08h], edi 0x0000003d dec dl 0x0000003f lea eax, dword ptr [00000000h+edx*4] 0x00000046 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C111D4F second address: 000000006C111B9E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F03F114D53Ch 0x00000007 mov cx, C106h 0x0000000b clc 0x0000000c push dword ptr [esp+08h] 0x00000010 retn 000Ch 0x00000013 push edx 0x00000014 jmp 00007F03F114D704h 0x00000019 lea esp, dword ptr [esp+08h] 0x0000001d xor ebp, 78919713h 0x00000023 neg edx 0x00000025 jle 00007F03F114D627h 0x00000027 dec dl 0x00000029 mov cl, byte ptr [esp] 0x0000002c cmc 0x0000002d mov ah, bl 0x0000002f neg ax 0x00000032 not dx 0x00000035 add ebp, 14AEB17Ch 0x0000003b jmp 00007F03F114D768h 0x00000040 dec ecx 0x00000041 jp 00007F03F114D5C6h 0x00000047 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C111B9E second address: 000000006C111BA0 instructions: 0x00000000 rdtsc 0x00000002 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C111ED4 second address: 000000006C111EB1 instructions: 0x00000000 rdtsc 0x00000002 dec edx 0x00000003 jmp 00007F03F114D64Ah 0x00000005 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C112BA9 second address: 000000006C112BB2 instructions: 0x00000000 rdtsc 0x00000002 mov dx, bp 0x00000005 jmp 00007F03F04CFE05h 0x00000007 dec cl 0x00000009 mov ax, 47E1h 0x0000000d xchg ax, dx 0x0000000f mov dh, 48h 0x00000011 xchg al, dl 0x00000013 jmp 00007F03F04CFE31h 0x00000015 xchg ah, dl 0x00000017 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C112BB2 second address: 000000006C112C2B instructions: 0x00000000 rdtsc 0x00000002 neg cl 0x00000004 mov edx, 93AA06FAh 0x00000009 xchg dh, ah 0x0000000b jmp 00007F03F114D7B7h 0x00000010 lea edx, dword ptr [00000000h+edx*4] 0x00000017 xchg dl, dh 0x00000019 rol ax, 0006h 0x0000001d jno 00007F03F114D621h 0x0000001f mov eax, C887A24Eh 0x00000024 jmp 00007F03F114D61Fh 0x00000026 mov dl, ah 0x00000028 ror cl, 00000000h 0x0000002b mov dx, D7A1h 0x0000002f not dx 0x00000032 jmp 00007F03F114D62Fh 0x00000034 mov ax, 3C88h 0x00000038 mov eax, ebx 0x0000003a mov dx, 9261h 0x0000003e mov dx, F010h 0x00000042 xor cl, FFFFFF9Ah 0x00000045 jmp 00007F03F114D60Eh 0x00000047 pushad 0x00000048 pop word ptr [esp+04h] 0x0000004d mov dh, byte ptr [esp+10h] 0x00000051 mov word ptr [esp+10h], cx 0x00000056 mov eax, 08EAC384h 0x0000005b xchg ax, dx 0x0000005d jmp 00007F03F114D644h 0x0000005f ror al, 00000000h 0x00000062 jle 00007F03F114D6B1h 0x00000064 lea esp, dword ptr [esp+02h] 0x00000068 lea esp, dword ptr [esp+1Ch] 0x0000006c jmp 00007F03F114D652h 0x0000006e neg cl 0x00000070 mov ax, F747h 0x00000074 mov ax, word ptr [esp] 0x00000078 xchg al, dl 0x0000007a jmp 00007F03F114D684h 0x0000007c and ecx, 3Ch 0x0000007f rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C112C2B second address: 000000006C1123C2 instructions: 0x00000000 rdtsc 0x00000002 xchg dl, dh 0x00000004 not dh 0x00000006 bsr edx, esp 0x00000009 jmp 00007F03F04CFE86h 0x0000000b jc 00007F03F04CFDDAh 0x0000000d jnc 00007F03F04CFDD8h 0x0000000f mov eax, dword ptr [esi] 0x00000011 inc dx 0x00000013 jmp 00007F03F04CFE4Ch 0x00000015 jl 00007F03F04CFDFAh 0x00000017 mov dx, 0646h 0x0000001b mov dx, word ptr [esp] 0x0000001f jmp 00007F03F04CFE30h 0x00000021 mov dword ptr [ecx+edi], eax 0x00000024 not dx 0x00000027 bsr ax, si 0x0000002b jnc 00007F03F04CFE57h 0x0000002d cmc 0x0000002e sub esp, 19h 0x00000031 lea esp, dword ptr [esp+01h] 0x00000035 jmp 00007F03F04CFDE5h 0x00000037 add esi, 04h 0x0000003a xchg eax, ecx 0x0000003b mov dl, cl 0x0000003d sete dh 0x00000040 mov dl, 55h 0x00000042 jmp 00007F03F04CF4E1h 0x00000047 movzx ecx, byte ptr [ebp-01h] 0x0000004b call 00007F03F04CFE5Fh 0x00000050 mov edx, dword ptr [esp] 0x00000053 setl ah 0x00000056 pushfd 0x00000057 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C112731 second address: 000000006C112795 instructions: 0x00000000 rdtsc 0x00000002 dec eax 0x00000003 pushfd 0x00000004 ror ax, 0002h 0x00000008 push dword ptr [esp+24h] 0x0000000c retn 0028h 0x0000000f jmp 00007F03F114D709h 0x00000014 lea esp, dword ptr [esp+04h] 0x00000018 add cl, 00000029h 0x0000001b mov dx, word ptr [esp] 0x0000001f xor edx, 17E5CD6Eh 0x00000025 jnc 00007F03F114D63Fh 0x00000027 mov ax, word ptr [esp] 0x0000002b jmp 00007F03F114D6B7h 0x0000002d mov al, 2Ch 0x0000002f dec cl 0x00000031 mov ax, word ptr [esp] 0x00000035 mov dx, DA24h 0x00000039 jmp 00007F03F114D64Eh 0x0000003b rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C112322 second address: 000000006C1123C2 instructions: 0x00000000 rdtsc 0x00000002 xchg eax, edx 0x00000003 jmp 00007F03F04CFE3Ch 0x00000005 pushad 0x00000006 pop dx 0x00000008 lea esp, dword ptr [esp+02h] 0x0000000c cmp esi, ecx 0x0000000e jl 00007F03F04CFDFDh 0x00000010 mov edx, dword ptr [esp] 0x00000013 mov edx, dword ptr [esp] 0x00000016 lea eax, dword ptr [ecx+edi] 0x00000019 bswap edx 0x0000001b lea esp, dword ptr [esp+1Ch] 0x0000001f jmp 00007F03F04D0530h 0x00000024 ja 00007F03F04CF72Dh 0x0000002a movzx ecx, byte ptr [ebp-01h] 0x0000002e call 00007F03F04CFE5Fh 0x00000033 mov edx, dword ptr [esp] 0x00000036 setl ah 0x00000039 pushfd 0x0000003a rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C112250 second address: 000000006C112322 instructions: 0x00000000 rdtsc 0x00000002 lea eax, dword ptr [edx+edi] 0x00000005 cmp ax, 00007FF6h 0x00000009 mov edx, ebx 0x0000000b xchg dword ptr [esp+20h], ebp 0x0000000f jmp 00007F03F114D645h 0x00000011 mov eax, esp 0x00000013 lea eax, dword ptr [ecx+14D24E52h] 0x00000019 not dl 0x0000001b shl edx, cl 0x0000001d push dword ptr [esp+20h] 0x00000021 retn 0024h 0x00000024 lea esp, dword ptr [esp+0Ah] 0x00000028 jmp 00007F03F114D6CAh 0x0000002a lea esp, dword ptr [esp+01h] 0x0000002e jmp 00007F03F114D68Fh 0x00000030 mov edx, dword ptr [ecx+edi] 0x00000033 inc ax 0x00000035 jmp 00007F03F114D6BDh 0x00000037 jnle 00007F03F114D629h 0x00000039 mov ch, 4Fh 0x0000003b mov ch, dl 0x0000003d jmp 00007F03F114D69Dh 0x0000003f mov dword ptr [esi], edx 0x00000041 dec cl 0x00000043 jbe 00007F03F114D641h 0x00000045 xchg ch, cl 0x00000047 lea edx, dword ptr [00000000h+edi*4] 0x0000004e call 00007F03F114D761h 0x00000053 jmp 00007F03F114D642h 0x00000055 mov ah, byte ptr [esp] 0x00000058 bswap edx 0x0000005a mov eax, edx 0x0000005c lea ecx, dword ptr [edi+50h] 0x0000005f jmp 00007F03F114D621h 0x00000061 stc 0x00000062 jnc 00007F03F114D64Eh 0x00000064 bsf edx, ebp 0x00000067 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C124C16 second address: 000000006C124DEC instructions: 0x00000000 rdtsc 0x00000002 cpuid 0x00000004 call 00007F03F04CFE5Ah 0x00000009 mov cx, bp 0x0000000c jmp 00007F03F04CFE07h 0x0000000e neg bx 0x00000011 jle 00007F03F04CFE38h 0x00000013 mov ch, bl 0x00000015 call 00007F03F04CFE26h 0x0000001a add esp, 08h 0x0000001d jmp 00007F03F04CFE74h 0x0000001f jne 00007F03F04D041Fh 0x00000025 mov dl, 0Eh 0x00000027 mov ebx, dword ptr [esp] 0x0000002a neg al 0x0000002c jp 00007F03F04CF7C8h 0x00000032 jmp 00007F03F04CFE55h 0x00000034 mov ebp, dword ptr [esp] 0x00000037 lea esp, dword ptr [esp+04h] 0x0000003b lea ecx, dword ptr [00000000h+edi*4] 0x00000042 jmp 00007F03F04CFDFCh 0x00000044 lea ecx, dword ptr [7AF9D6E1h] 0x0000004a mov edx, esp 0x0000004c jmp 00007F03F04CFF7Fh 0x00000051 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C124DEC second address: 000000006C117F2A instructions: 0x00000000 rdtsc 0x00000002 mov si, cx 0x00000005 dec bx 0x00000007 ja 00007F03F114D56Ch 0x0000000d mov edi, dword ptr [esp] 0x00000010 lea esp, dword ptr [esp+04h] 0x00000014 setnb ch 0x00000017 lea eax, dword ptr [edi+24h] 0x0000001a sbb ah, bh 0x0000001c pop ebx 0x0000001d sub esp, 10h 0x00000020 jmp 00007F03F114D676h 0x00000022 jnle 00007F03F114D69Ah 0x00000024 xchg dx, si 0x00000027 sub esp, 07h 0x0000002a xchg dword ptr [esp+09h], esi 0x0000002e lea esp, dword ptr [esp+03h] 0x00000032 add esp, 14h 0x00000035 jo 00007F03F114D699h 0x00000037 jno 00007F03F114D67Ah 0x00000039 mov esi, dword ptr [esp] 0x0000003c lea esp, dword ptr [esp+04h] 0x00000040 jmp 00007F03F114083Ch 0x00000045 mov ebx, edi 0x00000047 lea edx, dword ptr [ebp-000000D4h] 0x0000004d rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C117F2A second address: 000000006C118032 instructions: 0x00000000 rdtsc 0x00000002 bswap edx 0x00000004 dec dl 0x00000006 jnc 00007F03F04CFDDDh 0x00000008 jmp 00007F03F04CFE0Ah 0x0000000a lea ecx, dword ptr [esp+46h] 0x0000000e setl cl 0x00000011 xor ecx, esp 0x00000013 jmp 00007F03F04CFE45h 0x00000015 btc eax, edi 0x00000018 mov ch, 37h 0x0000001a mov eax, 261E6951h 0x0000001f jmp 00007F03F04CFE00h 0x00000021 dec edi 0x00000022 mov ecx, 956D842Eh 0x00000027 push edi 0x00000028 mov ecx, dword ptr [esp] 0x0000002b xchg al, dl 0x0000002d jmp 00007F03F04CFEA4h 0x00000032 push word ptr [esp+03h] 0x00000037 jnc 00007F03F04CFE05h 0x00000039 lea esp, dword ptr [esp+02h] 0x0000003d jmp 00007F03F04CFEDBh 0x00000042 lea esp, dword ptr [esp+04h] 0x00000046 xor edi, 57188A76h 0x0000004c rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C111AEE second address: 000000006C111AF0 instructions: 0x00000000 rdtsc 0x00000002 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C112BD3 second address: 000000006C112BB2 instructions: 0x00000000 rdtsc 0x00000002 mov dx, bp 0x00000005 jmp 00007F03F04CFDDBh 0x00000007 dec cl 0x00000009 mov ax, 47E1h 0x0000000d xchg ax, dx 0x0000000f mov dh, 48h 0x00000011 xchg al, dl 0x00000013 jmp 00007F03F04CFE31h 0x00000015 xchg ah, dl 0x00000017 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C123C6A second address: 000000006C123CE7 instructions: 0x00000000 rdtsc 0x00000002 neg eax 0x00000004 push dword ptr [esp] 0x00000007 retn 0004h 0x0000000a add esi, 04h 0x0000000d xchg cl, dl 0x0000000f not dl 0x00000011 jmp 00007F03F114D6F8h 0x00000016 push edi 0x00000017 mov cx, word ptr [esp] 0x0000001b mov ax, bp 0x0000001e xchg ecx, edx 0x00000020 mov edx, dword ptr [esp] 0x00000023 jmp 00007F03F114D694h 0x00000025 push ebp 0x00000026 xchg ebp, eax 0x00000028 mov ecx, 14D54B91h 0x0000002d neg edi 0x0000002f jbe 00007F03F114D644h 0x00000031 jmp 00007F03F114D6F9h 0x00000036 push esi 0x00000037 btc si, bx 0x0000003b jnle 00007F03F114D63Fh 0x0000003d mov ebp, esp 0x0000003f sets ah 0x00000042 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C123CE7 second address: 000000006C1159BC instructions: 0x00000000 rdtsc 0x00000002 mov eax, A6DEB4F0h 0x00000007 lea ebp, dword ptr [00000000h+ebp*4] 0x0000000e jmp 00007F03F04CFDE5h 0x00000010 lea edx, dword ptr [ecx+edx] 0x00000013 sub esp, 01h 0x00000016 jno 00007F03F04CFE9Bh 0x00000018 lea esp, dword ptr [esp+01h] 0x0000001c pop ebp 0x0000001d lea eax, dword ptr [ecx-7Eh] 0x00000020 rol cl, 00000000h 0x00000023 jns 00007F03F04CFD9Eh 0x00000029 call 00007F03F04CFE53h 0x0000002e jmp 00007F03F04CFE3Ch 0x00000030 pop edx 0x00000031 pop edi 0x00000032 btr dx, di 0x00000036 jmp 00007F03F04CFE59h 0x00000038 jne 00007F03F04CFDEDh 0x0000003a rcr cl, 1 0x0000003c bsf esi, edx 0x0000003f bsf edx, edi 0x00000042 jmp 00007F03F04D004Bh 0x00000047 pop esi 0x00000048 jmp 00007F03F04C1734h 0x0000004d mov ebx, edi 0x0000004f stc 0x00000050 jc 00007F03F04CFF6Ch 0x00000056 inc cx 0x00000058 mov dh, byte ptr [esp] 0x0000005b inc eax 0x0000005c rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C1176EA second address: 000000006C117ECD instructions: 0x00000000 rdtsc 0x00000002 setnb ch 0x00000005 pushad 0x00000006 jmp 00007F03F114DE4Ah 0x0000000b add ebp, 04h 0x0000000e rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C122E2D second address: 000000006C117F2A instructions: 0x00000000 rdtsc 0x00000002 setb al 0x00000005 mov dl, ah 0x00000007 jmp 00007F03F04CFE30h 0x00000009 pop esi 0x0000000a jmp 00007F03F04C4EFDh 0x0000000f mov ebx, edi 0x00000011 lea edx, dword ptr [ebp-000000D4h] 0x00000017 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C130647 second address: 000000006C1159BC instructions: 0x00000000 rdtsc 0x00000002 push dword ptr [esp+04h] 0x00000006 retn 0008h 0x00000009 mov dh, byte ptr [esp] 0x0000000c mov al, byte ptr [esp] 0x0000000f jmp 00007F03F114D757h 0x00000014 add ebp, 04h 0x00000017 mov dl, byte ptr [esp] 0x0000001a push edi 0x0000001b jmp 00007F03F1132830h 0x00000020 mov ebx, edi 0x00000022 stc 0x00000023 jc 00007F03F114D7BCh 0x00000029 inc cx 0x0000002b mov dh, byte ptr [esp] 0x0000002e inc eax 0x0000002f rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C124754 second address: 000000006C1119ED instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F03F04BCFC5h 0x00000007 mov ebx, ebp 0x00000009 setns dh 0x0000000c call 00007F03F04CFE01h 0x00000011 jmp 00007F03F04CFE44h 0x00000013 rcr dl, cl 0x00000015 jbe 00007F03F04CFEF9h 0x0000001b lea esp, dword ptr [esp+03h] 0x0000001f lea esp, dword ptr [esp+01h] 0x00000023 call 00007F03F04CFD8Dh 0x00000028 lea edx, dword ptr [00000000h+edx*4] 0x0000002f mov ah, dh 0x00000031 bswap eax 0x00000033 rol cx, 0005h 0x00000037 xchg edx, ecx 0x00000039 jmp 00007F03F04CFDEDh 0x0000003b xchg dword ptr [esp], ebp 0x0000003e mov eax, ecx 0x00000040 sub esp, 0Ah 0x00000043 sub esp, 17h 0x00000046 mov dl, 34h 0x00000048 lea esp, dword ptr [esp+01h] 0x0000004c jmp 00007F03F04CFE44h 0x0000004e lea ebp, dword ptr [ebp-00000061h] 0x00000054 pushad 0x00000055 btc eax, eax 0x00000058 call 00007F03F04CFE66h 0x0000005d add esp, 16h 0x00000060 pop word ptr [esp+05h] 0x00000065 xchg dword ptr [esp+2Ch], ebp 0x00000069 jmp 00007F03F04CFDFEh 0x0000006b xchg ch, al 0x0000006d mov ah, byte ptr [esp] 0x00000070 xchg eax, ecx 0x00000071 or edx, ebp 0x00000073 push dword ptr [esp+2Ch] 0x00000077 retn 0030h 0x0000007a pushfd 0x0000007b jmp 00007F03F04CFE59h 0x0000007d not dl 0x0000007f mov dx, word ptr [esp+01h] 0x00000084 mov cl, DCh 0x00000086 lea edx, dword ptr [esp+ebx] 0x00000089 jmp 00007F03F04CFE51h 0x0000008b lea esp, dword ptr [esp+04h] 0x0000008f xor ebp, 52439BAEh 0x00000095 mov dx, word ptr [esp] 0x00000099 call 00007F03F04CFDFCh 0x0000009e rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C124A65 second address: 000000006C12496E instructions: 0x00000000 rdtsc 0x00000002 call 00007F03F114D5D5h 0x00000007 jmp 00007F03F114D605h 0x00000009 push edi 0x0000000a mov ax, word ptr [esp] 0x0000000e neg ax 0x00000011 jnle 00007F03F114D652h 0x00000013 jle 00007F03F114D69Dh 0x00000015 xchg bx, dx 0x00000018 lea eax, dword ptr [esp+ebp] 0x0000001b jmp 00007F03F114D63Fh 0x0000001d push ebp 0x0000001e rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C1331EA second address: 000000006C133392 instructions: 0x00000000 rdtsc 0x00000002 pop word ptr [esp] 0x00000006 lea esp, dword ptr [esp+02h] 0x0000000a push ecx 0x0000000b mov dx, word ptr [esp+03h] 0x00000010 lea esp, dword ptr [esp+02h] 0x00000014 mov dx, bp 0x00000017 jmp 00007F03F04CFE83h 0x00000019 clc 0x0000001a jnp 00007F03F04CFE6Eh 0x0000001c add esp, 01h 0x0000001f xchg byte ptr [esp], al 0x00000022 jmp 00007F03F04CFE50h 0x00000024 lea esp, dword ptr [esp+01h] 0x00000028 jmp 00007F03F04CFE6Ah 0x0000002a dec cl 0x0000002c setne ah 0x0000002f or ah, 00000039h 0x00000032 jnle 00007F03F04CFE00h 0x00000034 call 00007F03F04CFE4Ch 0x00000039 mov dx, 572Bh 0x0000003d jmp 00007F03F04CFEFEh 0x00000042 pop edx 0x00000043 mov ax, word ptr [esp] 0x00000047 neg cl 0x00000049 push dx 0x0000004b bsf dx, si 0x0000004f jmp 00007F03F04CFD6Ah 0x00000054 js 00007F03F04CFE68h 0x00000056 mov word ptr [esp], ax 0x0000005a mov eax, D88CB197h 0x0000005f jmp 00007F03F04CFDFFh 0x00000061 stc 0x00000062 neg al 0x00000064 lea esp, dword ptr [esp+02h] 0x00000068 jmp 00007F03F04CFE87h 0x0000006a jmp 00007F03F04CFDEBh 0x0000006c ror cl, 00000000h 0x0000006f js 00007F03F04CFE07h 0x00000071 mov eax, E4F1882Bh 0x00000076 push bp 0x00000078 mov dl, 90h 0x0000007a stc 0x0000007b bsr eax, ebx 0x0000007e jmp 00007F03F04CFE45h 0x00000080 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C139DE0 second address: 000000006C139E23 instructions: 0x00000000 rdtsc 0x00000002 add cl, bl 0x00000004 mov ax, 04BCh 0x00000008 jmp 00007F03F114D6ABh 0x0000000a rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C1349AA second address: 000000006C134A09 instructions: 0x00000000 rdtsc 0x00000002 xchg dl, al 0x00000004 call 00007F03F04CFE06h 0x00000009 xchg edx, eax 0x0000000b mov al, ch 0x0000000d lea ecx, dword ptr [ecx-0000001Eh] 0x00000013 mov eax, edx 0x00000015 jmp 00007F03F04CFE68h 0x00000017 neg ax 0x0000001a neg ax 0x0000001d xchg dword ptr [esp+04h], ecx 0x00000021 xchg dx, ax 0x00000024 sets dh 0x00000027 mov cl, 83h 0x00000029 jmp 00007F03F04CFDF8h 0x0000002b push dword ptr [esp+04h] 0x0000002f retn 0008h 0x00000032 lea esp, dword ptr [esp+02h] 0x00000036 jmp 00007F03F04CFF66h 0x0000003b mov ecx, dword ptr [ebp+00h] 0x0000003e setne al 0x00000041 call 00007F03F04CFD80h 0x00000046 mov word ptr [esp], ax 0x0000004a rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C166AE6 second address: 000000006C166B31 instructions: 0x00000000 rdtsc 0x00000002 not ax 0x00000005 mov dh, byte ptr [esp] 0x00000008 lea ebx, dword ptr [ebx-0004D2B9h] 0x0000000e lea eax, dword ptr [00000000h+eax*4] 0x00000015 not eax 0x00000017 jmp 00007F03F114D6A4h 0x00000019 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C170C16 second address: 000000006C170CB8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F03F04CFDD5h 0x00000004 mov ecx, dword ptr [esi] 0x00000006 btc dx, sp 0x0000000a jmp 00007F03F04CFE47h 0x0000000c je 00007F03F04CFDFFh 0x0000000e shr edx, 0Bh 0x00000011 bts eax, esi 0x00000014 jmp 00007F03F04CFE87h 0x00000016 add esi, 04h 0x00000019 btr ax, bp 0x0000001d jp 00007F03F04CFE03h 0x0000001f neg al 0x00000021 call 00007F03F04CFE45h 0x00000026 mov al, ah 0x00000028 btc ax, bx 0x0000002c call 00007F03F04CFE61h 0x00000031 xchg dword ptr [esp], edx 0x00000034 xchg dword ptr [esp+04h], ebp 0x00000038 mov al, 96h 0x0000003a jmp 00007F03F04CFE01h 0x0000003c mov edx, edi 0x0000003e ror ax, cl 0x00000041 sub dh, bh 0x00000043 mov eax, dword ptr [esp] 0x00000046 lea ebp, dword ptr [ebp+3Bh] 0x00000049 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C170CB8 second address: 000000006C170CCE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F03F114D682h 0x00000004 mov dh, CEh 0x00000006 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C118151 second address: 000000006C117F2A instructions: 0x00000000 rdtsc 0x00000002 mov cx, di 0x00000005 call 00007F03F04CFD3Eh 0x0000000a jmp 00007F03F04CFD00h 0x0000000f sub esp, 000000B8h 0x00000015 mov esi, esp 0x00000017 xchg ebx, edx 0x00000019 xchg edx, ecx 0x0000001b lea ebx, dword ptr [00000000h+esi*4] 0x00000022 jmp 00007F03F04CFDDBh 0x00000024 mov ebx, edi 0x00000026 lea edx, dword ptr [ebp-000000D4h] 0x0000002c rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C115855 second address: 000000006C1159BC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F03F114D649h 0x00000004 mov edi, dword ptr [esp+30h] 0x00000008 lea ebp, dword ptr [eax-0Eh] 0x0000000b setle ah 0x0000000e mov bx, 0BAAh 0x00000012 mov cx, 83A5h 0x00000016 jmp 00007F03F114D687h 0x00000018 lea ebp, dword ptr [esp+04h] 0x0000001c mov dl, byte ptr [esp] 0x0000001f mov ah, byte ptr [esp] 0x00000022 cpuid 0x00000024 jmp 00007F03F114D699h 0x00000026 sub esp, 000000BCh 0x0000002c mov esi, esp 0x0000002e setnp ah 0x00000031 lea ebx, dword ptr [esi+000077EAh] 0x00000037 lea edx, dword ptr [00000000h+ebp*4] 0x0000003e jmp 00007F03F114D631h 0x00000040 mov ebx, edi 0x00000042 stc 0x00000043 jc 00007F03F114D7BCh 0x00000049 inc cx 0x0000004b mov dh, byte ptr [esp] 0x0000004e inc eax 0x0000004f rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C1821E3 second address: 000000006C18231F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F03F04CFF5Ah 0x00000007 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C1625C0 second address: 000000006C1625CB instructions: 0x00000000 rdtsc 0x00000002 call 00007F03F114D654h 0x00000007 pop word ptr [esp] 0x0000000b lea esp, dword ptr [esp+02h] 0x0000000f jmp 00007F03F114D689h 0x00000011 pushad 0x00000012 mov cl, byte ptr [esp] 0x00000015 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C1625CB second address: 000000006C1625FD instructions: 0x00000000 rdtsc 0x00000002 not bh 0x00000004 jmp 00007F03F04CFE4Eh 0x00000006 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C1625FD second address: 000000006C1123C2 instructions: 0x00000000 rdtsc 0x00000002 mov dword ptr [esp+14h], esi 0x00000006 popad 0x00000007 mov word ptr [edx], cx 0x0000000a btc eax, edx 0x0000000d jnc 00007F03F114D64Dh 0x0000000f mov edx, edi 0x00000011 mov ecx, B7952469h 0x00000016 jmp 00007F03F111F656h 0x0000001b jmp 00007F03F114D6BFh 0x0000001d mov dx, word ptr [esp] 0x00000021 mov ecx, 4842D8C4h 0x00000026 jmp 00007F03F114D61Ah 0x00000028 lea edx, dword ptr [edi+50h] 0x0000002b mov al, bl 0x0000002d bswap eax 0x0000002f cmc 0x00000030 jne 00007F03F114D69Fh 0x00000032 jmp 00007F03F114D6EDh 0x00000034 cmp esi, edx 0x00000036 ja 00007F03F112B337h 0x0000003c movzx ecx, byte ptr [ebp-01h] 0x00000040 call 00007F03F114D6AFh 0x00000045 mov edx, dword ptr [esp] 0x00000048 setl ah 0x0000004b pushfd 0x0000004c rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C15F91C second address: 000000006C15F939 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F03F04CFE00h 0x00000004 lea eax, dword ptr [ecx+ebp] 0x00000007 jmp 00007F03F04CFE55h 0x00000009 mov cx, word ptr [esi] 0x0000000c rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C15F939 second address: 000000006C15F9AE instructions: 0x00000000 rdtsc 0x00000002 dec dx 0x00000004 jo 00007F03F114D653h 0x00000006 jno 00007F03F114D651h 0x00000008 jmp 00007F03F114D6A7h 0x0000000a sub esi, 02h 0x0000000d cmp dh, FFFFFFDBh 0x00000010 jno 00007F03F114D654h 0x00000012 mov eax, edx 0x00000014 lea edx, dword ptr [00000000h+ebp*4] 0x0000001b jmp 00007F03F114D6C1h 0x0000001d add word ptr [esi+04h], cx 0x00000021 mov dx, word ptr [esp] 0x00000025 mov dl, cl 0x00000027 not dh 0x00000029 jmp 00007F03F114D6D5h 0x0000002b pushfd 0x0000002c jmp 00007F03F114D60Ch 0x0000002e pop dword ptr [esi] 0x00000030 setnb dl 0x00000033 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C15F9AE second address: 000000006C15FA52 instructions: 0x00000000 rdtsc 0x00000002 call 00007F03F04D0131h 0x00000007 pop eax 0x00000008 call 00007F03F04CFBB0h 0x0000000d rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C15FA52 second address: 000000006C15FA81 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F03F114D658h 0x00000004 push esi 0x00000005 xchg dx, ax 0x00000008 mov byte ptr [esp+01h], dh 0x0000000c xchg dword ptr [esp+04h], ebp 0x00000010 push bp 0x00000012 jmp 00007F03F114D7FDh 0x00000017 lea edx, dword ptr [00000000h+ecx*4] 0x0000001e mov dl, C5h 0x00000020 lea esp, dword ptr [esp+02h] 0x00000024 lea ebp, dword ptr [ebp-0002B6CEh] 0x0000002a lea eax, dword ptr [ecx+ebp] 0x0000002d push si 0x0000002f jmp 00007F03F114D500h 0x00000034 mov dh, ch 0x00000036 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C15FA81 second address: 000000006C1123C2 instructions: 0x00000000 rdtsc 0x00000002 lea esp, dword ptr [esp+01h] 0x00000006 lea esp, dword ptr [esp+01h] 0x0000000a xchg dword ptr [esp+04h], ebp 0x0000000e mov dl, byte ptr [esp] 0x00000011 jmp 00007F03F04CFDE4h 0x00000013 mov dx, DBE7h 0x00000017 mov dh, byte ptr [esp] 0x0000001a lea eax, dword ptr [esp+edi] 0x0000001d push dword ptr [esp+04h] 0x00000021 retn 0008h 0x00000024 jmp 00007F03F04CFE6Fh 0x00000026 mov dx, word ptr [esp] 0x0000002a mov ecx, 4842D8C4h 0x0000002f jmp 00007F03F04CFDCAh 0x00000031 lea edx, dword ptr [edi+50h] 0x00000034 mov al, bl 0x00000036 bswap eax 0x00000038 cmc 0x00000039 jne 00007F03F04CFE4Fh 0x0000003b jmp 00007F03F04CFE9Dh 0x0000003d cmp esi, edx 0x0000003f ja 00007F03F04ADAE7h 0x00000045 movzx ecx, byte ptr [ebp-01h] 0x00000049 call 00007F03F04CFE5Fh 0x0000004e mov edx, dword ptr [esp] 0x00000051 setl ah 0x00000054 pushfd 0x00000055 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C1626BB second address: 000000006C1123C2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F03F114D64Bh 0x00000004 push dword ptr [esp] 0x00000007 retn 0004h 0x0000000a mov edx, edi 0x0000000c mov ecx, B7952469h 0x00000011 jmp 00007F03F111F622h 0x00000016 jmp 00007F03F114D6BFh 0x00000018 mov dx, word ptr [esp] 0x0000001c mov ecx, 4842D8C4h 0x00000021 jmp 00007F03F114D61Ah 0x00000023 lea edx, dword ptr [edi+50h] 0x00000026 mov al, bl 0x00000028 bswap eax 0x0000002a cmc 0x0000002b jne 00007F03F114D69Fh 0x0000002d jmp 00007F03F114D6EDh 0x0000002f cmp esi, edx 0x00000031 ja 00007F03F112B337h 0x00000037 movzx ecx, byte ptr [ebp-01h] 0x0000003b call 00007F03F114D6AFh 0x00000040 mov edx, dword ptr [esp] 0x00000043 setl ah 0x00000046 pushfd 0x00000047 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C159310 second address: 000000006C1592ED instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007F03F04CFDEEh 0x00000005 pop dword ptr [ebp+00h] 0x00000008 mov ecx, dword ptr [esp] 0x0000000b lea edx, dword ptr [ebx+edi] 0x0000000e setbe ah 0x00000011 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C15D864 second address: 000000006C1123C2 instructions: 0x00000000 rdtsc 0x00000002 stc 0x00000003 jc 00007F03F114D657h 0x00000005 pushfd 0x00000006 jmp 00007F03F114D691h 0x00000008 mov byte ptr [esp+01h], dl 0x0000000c sub esi, 08h 0x0000000f clc 0x00000010 js 00007F03F114D811h 0x00000016 jns 00007F03F114D7AEh 0x0000001c pushad 0x0000001d jmp 00007F03F114D6CDh 0x0000001f xchg edx, ecx 0x00000021 call 00007F03F114D543h 0x00000026 mov byte ptr [esp+01h], ah 0x0000002a mov dword ptr [esi], ecx 0x0000002c jmp 00007F03F114D62Dh 0x0000002e cmc 0x0000002f jle 00007F03F114D64Fh 0x00000031 lea ecx, dword ptr [edi-625E3360h] 0x00000037 mov cl, bl 0x00000039 jmp 00007F03F114D676h 0x0000003b mov dword ptr [esi+04h], eax 0x0000003e mov ecx, esp 0x00000040 ror cx, cl 0x00000043 jnle 00007F03F114D641h 0x00000045 jle 00007F03F114D67Ah 0x00000047 bswap eax 0x00000049 jmp 00007F03F1124390h 0x0000004e jmp 00007F03F114D6BFh 0x00000050 mov dx, word ptr [esp] 0x00000054 mov ecx, 4842D8C4h 0x00000059 jmp 00007F03F114D61Ah 0x0000005b lea edx, dword ptr [edi+50h] 0x0000005e mov al, bl 0x00000060 bswap eax 0x00000062 cmc 0x00000063 jne 00007F03F114D69Fh 0x00000065 jmp 00007F03F114D6EDh 0x00000067 cmp esi, edx 0x00000069 ja 00007F03F112B337h 0x0000006f movzx ecx, byte ptr [ebp-01h] 0x00000073 call 00007F03F114D6AFh 0x00000078 mov edx, dword ptr [esp] 0x0000007b setl ah 0x0000007e pushfd 0x0000007f rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C15F866 second address: 000000006C15F89B instructions: 0x00000000 rdtsc 0x00000002 lea ecx, dword ptr [eax+ebp] 0x00000005 bsr ecx, esi 0x00000008 jmp 00007F03F04CFDF9h 0x0000000a jl 00007F03F04CFDFAh 0x0000000c setbe cl 0x0000000f jmp 00007F03F04CFE44h 0x00000011 sub esi, 08h 0x00000014 pushad 0x00000015 pop word ptr [esp+08h] 0x0000001a push dx 0x0000001c jmp 00007F03F04CFDF3h 0x0000001e mov dword ptr [esi], edx 0x00000020 bsf edx, esi 0x00000023 je 00007F03F04D02F7h 0x00000029 lea ecx, dword ptr [ecx-000000F0h] 0x0000002f jmp 00007F03F04D02F1h 0x00000034 jmp 00007F03F04CFDE3h 0x00000036 mov dword ptr [esi+04h], eax 0x00000039 lea eax, dword ptr [00000000h+eax*4] 0x00000040 mov dx, cx 0x00000043 mov ecx, dword ptr [esp] 0x00000046 lea eax, dword ptr [00000000h+ecx*4] 0x0000004d call 00007F03F04CFA04h 0x00000052 btc edx, edi 0x00000055 jmp 00007F03F04CFDE0h 0x00000057 mov cx, 540Dh 0x0000005b mov dx, 46EEh 0x0000005f lea eax, dword ptr [00000000h+ecx*4] 0x00000066 xchg dword ptr [esp], esi 0x00000069 lea edx, dword ptr [00000000h+ebx*4] 0x00000070 xchg ecx, eax 0x00000072 jmp 00007F03F04CFDEFh 0x00000074 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C142C4F second address: 000000006C1123C2 instructions: 0x00000000 rdtsc 0x00000002 mov dl, byte ptr [ecx] 0x00000004 jmp 00007F03F114D640h 0x00000006 setp ch 0x00000009 stc 0x0000000a jbe 00007F03F114D656h 0x0000000c mov word ptr [esi], dx 0x0000000f neg ax 0x00000012 jmp 00007F03F114D713h 0x00000017 jng 00007F03F114D5E5h 0x0000001d mov cx, word ptr [esp] 0x00000021 sub cl, 0000007Ah 0x00000024 mov edx, 612135A8h 0x00000029 jmp 00007F03F111CDB1h 0x0000002e movzx ecx, byte ptr [ebp-01h] 0x00000032 call 00007F03F114D6AFh 0x00000037 mov edx, dword ptr [esp] 0x0000003a setl ah 0x0000003d pushfd 0x0000003e rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C142D84 second address: 000000006C1123C2 instructions: 0x00000000 rdtsc 0x00000002 not eax 0x00000004 pushfd 0x00000005 jmp 00007F03F04CFDACh 0x00000007 mov eax, ecx 0x00000009 push dword ptr [esp+08h] 0x0000000d retn 000Ch 0x00000010 movzx ecx, byte ptr [ebp-01h] 0x00000014 call 00007F03F04CFE5Fh 0x00000019 mov edx, dword ptr [esp] 0x0000001c setl ah 0x0000001f pushfd 0x00000020 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C169BC2 second address: 000000006C1123C2 instructions: 0x00000000 rdtsc 0x00000002 sub esp, 14h 0x00000005 jl 00007F03F114D653h 0x00000007 jnl 00007F03F114D6FAh 0x0000000d push si 0x0000000f lea esp, dword ptr [esp+02h] 0x00000013 jmp 00007F03F114D612h 0x00000015 sub esi, 08h 0x00000018 call 00007F03F114D657h 0x0000001d xchg edx, ecx 0x0000001f push bx 0x00000021 lea esp, dword ptr [esp+02h] 0x00000025 jmp 00007F03F114D69Ch 0x00000027 mov dword ptr [esi], ecx 0x00000029 sbb ecx, CB232F3Fh 0x0000002f jnc 00007F03F114D652h 0x00000031 mov ecx, esp 0x00000033 jmp 00007F03F114D708h 0x00000038 bts cx, bx 0x0000003c jmp 00007F03F114D5DEh 0x00000041 mov ecx, esi 0x00000043 add ecx, 04h 0x00000046 jmp 00007F03F114D6BDh 0x00000048 jo 00007F03F114D629h 0x0000004a mov dword ptr [ecx], eax 0x0000004c xchg ax, cx 0x0000004e jmp 00007F03F114D644h 0x00000050 add ecx, esp 0x00000052 setnle al 0x00000055 btc ecx, esi 0x00000058 jmp 00007F03F1118006h 0x0000005d jmp 00007F03F114D6BFh 0x0000005f mov dx, word ptr [esp] 0x00000063 mov ecx, 4842D8C4h 0x00000068 jmp 00007F03F114D61Ah 0x0000006a lea edx, dword ptr [edi+50h] 0x0000006d mov al, bl 0x0000006f bswap eax 0x00000071 cmc 0x00000072 jne 00007F03F114D69Fh 0x00000074 jmp 00007F03F114D6EDh 0x00000076 cmp esi, edx 0x00000078 ja 00007F03F112B337h 0x0000007e movzx ecx, byte ptr [ebp-01h] 0x00000082 call 00007F03F114D6AFh 0x00000087 mov edx, dword ptr [esp] 0x0000008a setl ah 0x0000008d pushfd 0x0000008e rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C1918F7 second address: 000000006C112322 instructions: 0x00000000 rdtsc 0x00000002 mov ecx, C0ADFBF7h 0x00000007 jmp 00007F03F04CFE48h 0x00000009 pushfd 0x0000000a pop dword ptr [esi] 0x0000000c call 00007F03F04CFE26h 0x00000011 mov al, 81h 0x00000013 jmp 00007F03F0450850h 0x00000018 mov ah, byte ptr [esp] 0x0000001b bswap edx 0x0000001d mov eax, edx 0x0000001f lea ecx, dword ptr [edi+50h] 0x00000022 jmp 00007F03F04CFDD1h 0x00000024 stc 0x00000025 jnc 00007F03F04CFDFEh 0x00000027 bsf edx, ebp 0x0000002a rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C17D1DF second address: 000000006C17D2F3 instructions: 0x00000000 rdtsc 0x00000002 mov cx, word ptr [ebp+00h] 0x00000006 or dh, al 0x00000008 jp 00007F03F114D652h 0x0000000a xchg eax, edx 0x0000000b xchg ax, dx 0x0000000d jmp 00007F03F114D71Dh 0x00000012 sub ebp, 02h 0x00000015 lea eax, dword ptr [121ADBD9h] 0x0000001b mov eax, dword ptr [esp] 0x0000001e shr edx, cl 0x00000020 jne 00007F03F114D891h 0x00000026 jmp 00007F03F114D4B3h 0x0000002b mov dh, 9Fh 0x0000002d add word ptr [ebp+04h], cx 0x00000031 bswap eax 0x00000033 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C1E1309 second address: 000000006C1E12EB instructions: 0x00000000 rdtsc 0x00000002 xchg si, ax 0x00000005 jmp 00007F03F04CFDF9h 0x00000007 mov eax, edi 0x00000009 bswap eax 0x0000000b rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C117F2A second address: 000000006C118032 instructions: 0x00000000 rdtsc 0x00000002 bswap edx 0x00000004 dec dl 0x00000006 jnc 00007F03F04CFDDDh 0x00000008 jmp 00007F03F04CFE0Ah 0x0000000a lea ecx, dword ptr [esp+46h] 0x0000000e setl cl 0x00000011 xor ecx, esp 0x00000013 jmp 00007F03F04CFE45h 0x00000015 btc eax, edi 0x00000018 mov ch, 37h 0x0000001a mov eax, 261E6951h 0x0000001f jmp 00007F03F04CFE00h 0x00000021 dec edi 0x00000022 mov ecx, 956D842Eh 0x00000027 push edi 0x00000028 mov ecx, dword ptr [esp] 0x0000002b xchg al, dl 0x0000002d jmp 00007F03F04CFEA4h 0x00000032 push word ptr [esp+03h] 0x00000037 jnc 00007F03F04CFE05h 0x00000039 lea esp, dword ptr [esp+02h] 0x0000003d jmp 00007F03F04CFEBEh 0x00000042 lea esp, dword ptr [esp+04h] 0x00000046 xor edi, 57188A76h 0x0000004c rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C124705 second address: 000000006C1119ED instructions: 0x00000000 rdtsc 0x00000002 push ebp 0x00000003 mov edi, dword ptr [esp+04h] 0x00000007 mov ecx, 665DBA43h 0x0000000c jmp 00007F03F04CFDF2h 0x0000000e lea esp, dword ptr [esp+08h] 0x00000012 jmp 00007F03F04BD034h 0x00000017 mov ebx, ebp 0x00000019 setns dh 0x0000001c call 00007F03F04CFE01h 0x00000021 jmp 00007F03F04CFE44h 0x00000023 rcr dl, cl 0x00000025 jbe 00007F03F04CFEF9h 0x0000002b lea esp, dword ptr [esp+03h] 0x0000002f lea esp, dword ptr [esp+01h] 0x00000033 pushfd 0x00000034 not dl 0x00000036 mov dx, word ptr [esp+01h] 0x0000003b jmp 00007F03F04CFED0h 0x00000040 mov cl, DCh 0x00000042 lea edx, dword ptr [esp+ebx] 0x00000045 jmp 00007F03F04CFE51h 0x00000047 lea esp, dword ptr [esp+04h] 0x0000004b xor ebp, 52439BAEh 0x00000051 mov dx, word ptr [esp] 0x00000055 call 00007F03F04CFDFCh 0x0000005a rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C122E2D second address: 000000006C117F2A instructions: 0x00000000 rdtsc 0x00000002 setb al 0x00000005 mov dl, ah 0x00000007 jmp 00007F03F114D680h 0x00000009 pop esi 0x0000000a jmp 00007F03F114274Dh 0x0000000f mov ebx, edi 0x00000011 lea edx, dword ptr [ebp-000000D4h] 0x00000017 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C130647 second address: 000000006C1159BC instructions: 0x00000000 rdtsc 0x00000002 push dword ptr [esp+04h] 0x00000006 retn 0008h 0x00000009 mov dh, byte ptr [esp] 0x0000000c mov al, byte ptr [esp] 0x0000000f jmp 00007F03F04CFF07h 0x00000014 add ebp, 04h 0x00000017 mov dl, byte ptr [esp] 0x0000001a push edi 0x0000001b jmp 00007F03F04B4FE0h 0x00000020 mov ebx, edi 0x00000022 stc 0x00000023 jc 00007F03F04CFF6Ch 0x00000029 inc cx 0x0000002b mov dh, byte ptr [esp] 0x0000002e inc eax 0x0000002f rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C124754 second address: 000000006C1119ED instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F03F113A815h 0x00000007 mov ebx, ebp 0x00000009 setns dh 0x0000000c call 00007F03F114D651h 0x00000011 jmp 00007F03F114D694h 0x00000013 rcr dl, cl 0x00000015 jbe 00007F03F114D749h 0x0000001b lea esp, dword ptr [esp+03h] 0x0000001f lea esp, dword ptr [esp+01h] 0x00000023 call 00007F03F114D5DDh 0x00000028 lea edx, dword ptr [00000000h+edx*4] 0x0000002f mov ah, dh 0x00000031 bswap eax 0x00000033 rol cx, 0005h 0x00000037 xchg edx, ecx 0x00000039 jmp 00007F03F114D63Dh 0x0000003b xchg dword ptr [esp], ebp 0x0000003e mov eax, ecx 0x00000040 sub esp, 0Ah 0x00000043 sub esp, 17h 0x00000046 mov dl, 34h 0x00000048 lea esp, dword ptr [esp+01h] 0x0000004c jmp 00007F03F114D694h 0x0000004e lea ebp, dword ptr [ebp-00000061h] 0x00000054 pushad 0x00000055 btc eax, eax 0x00000058 call 00007F03F114D6B6h 0x0000005d add esp, 16h 0x00000060 pop word ptr [esp+05h] 0x00000065 xchg dword ptr [esp+2Ch], ebp 0x00000069 jmp 00007F03F114D64Eh 0x0000006b xchg ch, al 0x0000006d mov ah, byte ptr [esp] 0x00000070 xchg eax, ecx 0x00000071 or edx, ebp 0x00000073 push dword ptr [esp+2Ch] 0x00000077 retn 0030h 0x0000007a pushfd 0x0000007b jmp 00007F03F114D6A9h 0x0000007d not dl 0x0000007f mov dx, word ptr [esp+01h] 0x00000084 mov cl, DCh 0x00000086 lea edx, dword ptr [esp+ebx] 0x00000089 jmp 00007F03F114D6A1h 0x0000008b lea esp, dword ptr [esp+04h] 0x0000008f xor ebp, 52439BAEh 0x00000095 mov dx, word ptr [esp] 0x00000099 call 00007F03F114D64Ch 0x0000009e rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C124A65 second address: 000000006C12496E instructions: 0x00000000 rdtsc 0x00000002 call 00007F03F04CFD85h 0x00000007 jmp 00007F03F04CFDB5h 0x00000009 push edi 0x0000000a mov ax, word ptr [esp] 0x0000000e neg ax 0x00000011 jnle 00007F03F04CFE02h 0x00000013 jle 00007F03F04CFE4Dh 0x00000015 xchg bx, dx 0x00000018 lea eax, dword ptr [esp+ebp] 0x0000001b jmp 00007F03F04CFDEFh 0x0000001d push ebp 0x0000001e rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C1331EA second address: 000000006C133392 instructions: 0x00000000 rdtsc 0x00000002 pop word ptr [esp] 0x00000006 lea esp, dword ptr [esp+02h] 0x0000000a push ecx 0x0000000b mov dx, word ptr [esp+03h] 0x00000010 lea esp, dword ptr [esp+02h] 0x00000014 mov dx, bp 0x00000017 jmp 00007F03F114D6D3h 0x00000019 clc 0x0000001a jnp 00007F03F114D6BEh 0x0000001c add esp, 01h 0x0000001f xchg byte ptr [esp], al 0x00000022 jmp 00007F03F114D6A0h 0x00000024 lea esp, dword ptr [esp+01h] 0x00000028 jmp 00007F03F114D6BAh 0x0000002a dec cl 0x0000002c setne ah 0x0000002f or ah, 00000039h 0x00000032 jnle 00007F03F114D650h 0x00000034 call 00007F03F114D69Ch 0x00000039 mov dx, 572Bh 0x0000003d jmp 00007F03F114D74Eh 0x00000042 pop edx 0x00000043 mov ax, word ptr [esp] 0x00000047 neg cl 0x00000049 push dx 0x0000004b bsf dx, si 0x0000004f jmp 00007F03F114D5BAh 0x00000054 js 00007F03F114D6B8h 0x00000056 mov word ptr [esp], ax 0x0000005a mov eax, D88CB197h 0x0000005f jmp 00007F03F114D64Fh 0x00000061 stc 0x00000062 neg al 0x00000064 lea esp, dword ptr [esp+02h] 0x00000068 jmp 00007F03F114D6D7h 0x0000006a jmp 00007F03F114D63Bh 0x0000006c ror cl, 00000000h 0x0000006f js 00007F03F114D657h 0x00000071 mov eax, E4F1882Bh 0x00000076 push bp 0x00000078 mov dl, 90h 0x0000007a stc 0x0000007b bsr eax, ebx 0x0000007e jmp 00007F03F114D695h 0x00000080 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C139DE0 second address: 000000006C139E23 instructions: 0x00000000 rdtsc 0x00000002 add cl, bl 0x00000004 mov ax, 04BCh 0x00000008 jmp 00007F03F04CFE5Bh 0x0000000a rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C1349AA second address: 000000006C134A09 instructions: 0x00000000 rdtsc 0x00000002 xchg dl, al 0x00000004 call 00007F03F114D656h 0x00000009 xchg edx, eax 0x0000000b mov al, ch 0x0000000d lea ecx, dword ptr [ecx-0000001Eh] 0x00000013 mov eax, edx 0x00000015 jmp 00007F03F114D6B8h 0x00000017 neg ax 0x0000001a neg ax 0x0000001d xchg dword ptr [esp+04h], ecx 0x00000021 xchg dx, ax 0x00000024 sets dh 0x00000027 mov cl, 83h 0x00000029 jmp 00007F03F114D648h 0x0000002b push dword ptr [esp+04h] 0x0000002f retn 0008h 0x00000032 lea esp, dword ptr [esp+02h] 0x00000036 jmp 00007F03F114D7B6h 0x0000003b mov ecx, dword ptr [ebp+00h] 0x0000003e setne al 0x00000041 call 00007F03F114D5D0h 0x00000046 mov word ptr [esp], ax 0x0000004a rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C166AE6 second address: 000000006C166B31 instructions: 0x00000000 rdtsc 0x00000002 not ax 0x00000005 mov dh, byte ptr [esp] 0x00000008 lea ebx, dword ptr [ebx-0004D2B9h] 0x0000000e lea eax, dword ptr [00000000h+eax*4] 0x00000015 not eax 0x00000017 jmp 00007F03F04CFE54h 0x00000019 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C170C16 second address: 000000006C170CB8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F03F114D625h 0x00000004 mov ecx, dword ptr [esi] 0x00000006 btc dx, sp 0x0000000a jmp 00007F03F114D697h 0x0000000c je 00007F03F114D64Fh 0x0000000e shr edx, 0Bh 0x00000011 bts eax, esi 0x00000014 jmp 00007F03F114D6D7h 0x00000016 add esi, 04h 0x00000019 btr ax, bp 0x0000001d jp 00007F03F114D653h 0x0000001f neg al 0x00000021 call 00007F03F114D695h 0x00000026 mov al, ah 0x00000028 btc ax, bx 0x0000002c call 00007F03F114D6B1h 0x00000031 xchg dword ptr [esp], edx 0x00000034 xchg dword ptr [esp+04h], ebp 0x00000038 mov al, 96h 0x0000003a jmp 00007F03F114D651h 0x0000003c mov edx, edi 0x0000003e ror ax, cl 0x00000041 sub dh, bh 0x00000043 mov eax, dword ptr [esp] 0x00000046 lea ebp, dword ptr [ebp+3Bh] 0x00000049 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C170CB8 second address: 000000006C170CCE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F03F04CFE32h 0x00000004 mov dh, CEh 0x00000006 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C118151 second address: 000000006C117F2A instructions: 0x00000000 rdtsc 0x00000002 mov cx, di 0x00000005 call 00007F03F114D58Eh 0x0000000a jmp 00007F03F114D550h 0x0000000f sub esp, 000000B8h 0x00000015 mov esi, esp 0x00000017 xchg ebx, edx 0x00000019 xchg edx, ecx 0x0000001b lea ebx, dword ptr [00000000h+esi*4] 0x00000022 jmp 00007F03F114D62Bh 0x00000024 mov ebx, edi 0x00000026 lea edx, dword ptr [ebp-000000D4h] 0x0000002c rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C115855 second address: 000000006C1159BC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F03F04CFDF9h 0x00000004 mov edi, dword ptr [esp+30h] 0x00000008 lea ebp, dword ptr [eax-0Eh] 0x0000000b setle ah 0x0000000e mov bx, 0BAAh 0x00000012 mov cx, 83A5h 0x00000016 jmp 00007F03F04CFE37h 0x00000018 lea ebp, dword ptr [esp+04h] 0x0000001c mov dl, byte ptr [esp] 0x0000001f mov ah, byte ptr [esp] 0x00000022 cpuid 0x00000024 jmp 00007F03F04CFE49h 0x00000026 sub esp, 000000BCh 0x0000002c mov esi, esp 0x0000002e setnp ah 0x00000031 lea ebx, dword ptr [esi+000077EAh] 0x00000037 lea edx, dword ptr [00000000h+ebp*4] 0x0000003e jmp 00007F03F04CFDE1h 0x00000040 mov ebx, edi 0x00000042 stc 0x00000043 jc 00007F03F04CFF6Ch 0x00000049 inc cx 0x0000004b mov dh, byte ptr [esp] 0x0000004e inc eax 0x0000004f rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C1821E3 second address: 000000006C18231F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F03F114D7AAh 0x00000007 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C1625C0 second address: 000000006C1625CB instructions: 0x00000000 rdtsc 0x00000002 call 00007F03F04CFE04h 0x00000007 pop word ptr [esp] 0x0000000b lea esp, dword ptr [esp+02h] 0x0000000f jmp 00007F03F04CFE39h 0x00000011 pushad 0x00000012 mov cl, byte ptr [esp] 0x00000015 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C1625CB second address: 000000006C1625FD instructions: 0x00000000 rdtsc 0x00000002 not bh 0x00000004 jmp 00007F03F114D69Eh 0x00000006 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C1625FD second address: 000000006C1626BB instructions: 0x00000000 rdtsc 0x00000002 mov dword ptr [esp+14h], esi 0x00000006 popad 0x00000007 mov word ptr [edx], cx 0x0000000a btc eax, edx 0x0000000d jnc 00007F03F04CFDFDh 0x0000000f call 00007F03F04CFE63h 0x00000014 push sp 0x00000016 lea eax, dword ptr [esi+ebp] 0x00000019 lea eax, dword ptr [ebx-5Ah] 0x0000001c mov dx, word ptr [esp+01h] 0x00000021 xchg eax, ecx 0x00000022 jmp 00007F03F04CFE6Bh 0x00000024 lea esp, dword ptr [esp+02h] 0x00000028 xchg dword ptr [esp], esi 0x0000002b mov eax, 780BAA39h 0x00000030 bswap ecx 0x00000032 mov cx, si 0x00000035 xchg ecx, edx 0x00000037 jmp 00007F03F04CFDF7h 0x00000039 lea esi, dword ptr [esi+54h] 0x0000003c mov edx, dword ptr [esp] 0x0000003f mov eax, dword ptr [esp] 0x00000042 lea ecx, dword ptr [edx+000001E0h] 0x00000048 jmp 00007F03F04CFE52h 0x0000004a xchg dword ptr [esp], esi 0x0000004d xchg dl, dh 0x0000004f not edx 0x00000051 bsf dx, ax 0x00000055 mov al, AFh 0x00000057 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C123B0E second address: 000000006C1119ED instructions: 0x00000000 rdtsc 0x00000002 mov bx, word ptr [esp] 0x00000006 jmp 00007F03F04CFF9Fh 0x0000000b pop ebx 0x0000000c jmp 00007F03F04BDA87h 0x00000011 mov ebx, ebp 0x00000013 setns dh 0x00000016 call 00007F03F04CFE01h 0x0000001b jmp 00007F03F04CFE44h 0x0000001d rcr dl, cl 0x0000001f jbe 00007F03F04CFEF9h 0x00000025 lea esp, dword ptr [esp+03h] 0x00000029 lea esp, dword ptr [esp+01h] 0x0000002d pushfd 0x0000002e not dl 0x00000030 mov dx, word ptr [esp+01h] 0x00000035 jmp 00007F03F04CFED0h 0x0000003a mov cl, DCh 0x0000003c lea edx, dword ptr [esp+ebx] 0x0000003f jmp 00007F03F04CFE51h 0x00000041 lea esp, dword ptr [esp+04h] 0x00000045 xor ebp, 52439BAEh 0x0000004b mov dx, word ptr [esp] 0x0000004f call 00007F03F04CFDFCh 0x00000054 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C1119ED second address: 000000006C111D4F instructions: 0x00000000 rdtsc 0x00000002 setl dh 0x00000005 call 00007F03F114D694h 0x0000000a mov edx, esp 0x0000000c mov dl, dh 0x0000000e call 00007F03F114D69Fh 0x00000013 push esp 0x00000014 xchg dword ptr [esp+08h], edi 0x00000018 mov dx, cx 0x0000001b jmp 00007F03F114D676h 0x0000001d xchg ecx, eax 0x0000001f not cx 0x00000022 lea edx, dword ptr [eax-3083F03Ah] 0x00000028 lea edi, dword ptr [edi+3Ch] 0x0000002b rcr dh, cl 0x0000002d mov ecx, eax 0x0000002f jmp 00007F03F114D944h 0x00000034 mov ax, dx 0x00000037 neg dh 0x00000039 xchg dword ptr [esp+08h], edi 0x0000003d dec dl 0x0000003f lea eax, dword ptr [00000000h+edx*4] 0x00000046 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C111D4F second address: 000000006C111B9E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F03F04CFCECh 0x00000007 mov cx, C106h 0x0000000b clc 0x0000000c push dword ptr [esp+08h] 0x00000010 retn 000Ch 0x00000013 push edx 0x00000014 jmp 00007F03F04CFEB4h 0x00000019 lea esp, dword ptr [esp+08h] 0x0000001d xor ebp, 78919713h 0x00000023 neg edx 0x00000025 jle 00007F03F04CFDD7h 0x00000027 dec dl 0x00000029 mov cl, byte ptr [esp] 0x0000002c cmc 0x0000002d mov ah, bl 0x0000002f neg ax 0x00000032 not dx 0x00000035 add ebp, 14AEB17Ch 0x0000003b jmp 00007F03F04CFF18h 0x00000040 dec ecx 0x00000041 jp 00007F03F04CFD76h 0x00000047 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C111ED4 second address: 000000006C111EB1 instructions: 0x00000000 rdtsc 0x00000002 dec edx 0x00000003 jmp 00007F03F04CFDFAh 0x00000005 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C112BA9 second address: 000000006C112BB2 instructions: 0x00000000 rdtsc 0x00000002 mov dx, bp 0x00000005 jmp 00007F03F114D655h 0x00000007 dec cl 0x00000009 mov ax, 47E1h 0x0000000d xchg ax, dx 0x0000000f mov dh, 48h 0x00000011 xchg al, dl 0x00000013 jmp 00007F03F114D681h 0x00000015 xchg ah, dl 0x00000017 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C112BB2 second address: 000000006C112C2B instructions: 0x00000000 rdtsc 0x00000002 neg cl 0x00000004 mov edx, 93AA06FAh 0x00000009 xchg dh, ah 0x0000000b jmp 00007F03F04CFF67h 0x00000010 lea edx, dword ptr [00000000h+edx*4] 0x00000017 xchg dl, dh 0x00000019 rol ax, 0006h 0x0000001d jno 00007F03F04CFDD1h 0x0000001f mov eax, C887A24Eh 0x00000024 jmp 00007F03F04CFDCFh 0x00000026 mov dl, ah 0x00000028 ror cl, 00000000h 0x0000002b mov dx, D7A1h 0x0000002f not dx 0x00000032 jmp 00007F03F04CFDDFh 0x00000034 mov ax, 3C88h 0x00000038 mov eax, ebx 0x0000003a mov dx, 9261h 0x0000003e mov dx, F010h 0x00000042 xor cl, FFFFFF9Ah 0x00000045 jmp 00007F03F04CFDBEh 0x00000047 pushad 0x00000048 pop word ptr [esp+04h] 0x0000004d mov dh, byte ptr [esp+10h] 0x00000051 mov word ptr [esp+10h], cx 0x00000056 mov eax, 08EAC384h 0x0000005b xchg ax, dx 0x0000005d jmp 00007F03F04CFDF4h 0x0000005f ror al, 00000000h 0x00000062 jle 00007F03F04CFE61h 0x00000064 lea esp, dword ptr [esp+02h] 0x00000068 lea esp, dword ptr [esp+1Ch] 0x0000006c jmp 00007F03F04CFE02h 0x0000006e neg cl 0x00000070 mov ax, F747h 0x00000074 mov ax, word ptr [esp] 0x00000078 xchg al, dl 0x0000007a jmp 00007F03F04CFE34h 0x0000007c and ecx, 3Ch 0x0000007f rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C112C2B second address: 000000006C1123C2 instructions: 0x00000000 rdtsc 0x00000002 xchg dl, dh 0x00000004 not dh 0x00000006 bsr edx, esp 0x00000009 jmp 00007F03F114D6D6h 0x0000000b jc 00007F03F114D62Ah 0x0000000d jnc 00007F03F114D628h 0x0000000f mov eax, dword ptr [esi] 0x00000011 inc dx 0x00000013 jmp 00007F03F114D69Ch 0x00000015 jl 00007F03F114D64Ah 0x00000017 mov dx, 0646h 0x0000001b mov dx, word ptr [esp] 0x0000001f jmp 00007F03F114D680h 0x00000021 mov dword ptr [ecx+edi], eax 0x00000024 not dx 0x00000027 bsr ax, si 0x0000002b jnc 00007F03F114D6A7h 0x0000002d cmc 0x0000002e sub esp, 19h 0x00000031 lea esp, dword ptr [esp+01h] 0x00000035 jmp 00007F03F114D635h 0x00000037 add esi, 04h 0x0000003a xchg eax, ecx 0x0000003b mov dl, cl 0x0000003d sete dh 0x00000040 mov dl, 55h 0x00000042 jmp 00007F03F114CD31h 0x00000047 movzx ecx, byte ptr [ebp-01h] 0x0000004b call 00007F03F114D6AFh 0x00000050 mov edx, dword ptr [esp] 0x00000053 setl ah 0x00000056 pushfd 0x00000057 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C112731 second address: 000000006C112795 instructions: 0x00000000 rdtsc 0x00000002 dec eax 0x00000003 pushfd 0x00000004 ror ax, 0002h 0x00000008 push dword ptr [esp+24h] 0x0000000c retn 0028h 0x0000000f jmp 00007F03F04CFEB9h 0x00000014 lea esp, dword ptr [esp+04h] 0x00000018 add cl, 00000029h 0x0000001b mov dx, word ptr [esp] 0x0000001f xor edx, 17E5CD6Eh 0x00000025 jnc 00007F03F04CFDEFh 0x00000027 mov ax, word ptr [esp] 0x0000002b jmp 00007F03F04CFE67h 0x0000002d mov al, 2Ch 0x0000002f dec cl 0x00000031 mov ax, word ptr [esp] 0x00000035 mov dx, DA24h 0x00000039 jmp 00007F03F04CFDFEh 0x0000003b rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C112322 second address: 000000006C1123C2 instructions: 0x00000000 rdtsc 0x00000002 xchg eax, edx 0x00000003 jmp 00007F03F114D68Ch 0x00000005 pushad 0x00000006 pop dx 0x00000008 lea esp, dword ptr [esp+02h] 0x0000000c cmp esi, ecx 0x0000000e jl 00007F03F114D64Dh 0x00000010 mov edx, dword ptr [esp] 0x00000013 mov edx, dword ptr [esp] 0x00000016 lea eax, dword ptr [ecx+edi] 0x00000019 bswap edx 0x0000001b lea esp, dword ptr [esp+1Ch] 0x0000001f jmp 00007F03F114DD80h 0x00000024 ja 00007F03F114CF7Dh 0x0000002a movzx ecx, byte ptr [ebp-01h] 0x0000002e call 00007F03F114D6AFh 0x00000033 mov edx, dword ptr [esp] 0x00000036 setl ah 0x00000039 pushfd 0x0000003a rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C112250 second address: 000000006C112322 instructions: 0x00000000 rdtsc 0x00000002 lea eax, dword ptr [edx+edi] 0x00000005 cmp ax, 00007FF6h 0x00000009 mov edx, ebx 0x0000000b xchg dword ptr [esp+20h], ebp 0x0000000f jmp 00007F03F04CFDF5h 0x00000011 mov eax, esp 0x00000013 lea eax, dword ptr [ecx+14D24E52h] 0x00000019 not dl 0x0000001b shl edx, cl 0x0000001d push dword ptr [esp+20h] 0x00000021 retn 0024h 0x00000024 lea esp, dword ptr [esp+0Ah] 0x00000028 jmp 00007F03F04CFE7Ah 0x0000002a lea esp, dword ptr [esp+01h] 0x0000002e jmp 00007F03F04CFE3Fh 0x00000030 mov edx, dword ptr [ecx+edi] 0x00000033 inc ax 0x00000035 jmp 00007F03F04CFE6Dh 0x00000037 jnle 00007F03F04CFDD9h 0x00000039 mov ch, 4Fh 0x0000003b mov ch, dl 0x0000003d jmp 00007F03F04CFE4Dh 0x0000003f mov dword ptr [esi], edx 0x00000041 dec cl 0x00000043 jbe 00007F03F04CFDF1h 0x00000045 xchg ch, cl 0x00000047 lea edx, dword ptr [00000000h+edi*4] 0x0000004e call 00007F03F04CFF11h 0x00000053 jmp 00007F03F04CFDF2h 0x00000055 mov ah, byte ptr [esp] 0x00000058 bswap edx 0x0000005a mov eax, edx 0x0000005c lea ecx, dword ptr [edi+50h] 0x0000005f jmp 00007F03F04CFDD1h 0x00000061 stc 0x00000062 jnc 00007F03F04CFDFEh 0x00000064 bsf edx, ebp 0x00000067 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C124C16 second address: 000000006C124DEC instructions: 0x00000000 rdtsc 0x00000002 cpuid 0x00000004 call 00007F03F114D6AAh 0x00000009 mov cx, bp 0x0000000c jmp 00007F03F114D657h 0x0000000e neg bx 0x00000011 jle 00007F03F114D688h 0x00000013 mov ch, bl 0x00000015 call 00007F03F114D676h 0x0000001a add esp, 08h 0x0000001d jmp 00007F03F114D6C4h 0x0000001f jne 00007F03F114DC6Fh 0x00000025 mov dl, 0Eh 0x00000027 mov ebx, dword ptr [esp] 0x0000002a neg al 0x0000002c jp 00007F03F114D018h 0x00000032 jmp 00007F03F114D6A5h 0x00000034 mov ebp, dword ptr [esp] 0x00000037 lea esp, dword ptr [esp+04h] 0x0000003b lea ecx, dword ptr [00000000h+edi*4] 0x00000042 jmp 00007F03F114D64Ch 0x00000044 lea ecx, dword ptr [7AF9D6E1h] 0x0000004a mov edx, esp 0x0000004c jmp 00007F03F114D7CFh 0x00000051 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C124DEC second address: 000000006C117F2A instructions: 0x00000000 rdtsc 0x00000002 mov si, cx 0x00000005 dec bx 0x00000007 ja 00007F03F04CFD1Ch 0x0000000d mov edi, dword ptr [esp] 0x00000010 lea esp, dword ptr [esp+04h] 0x00000014 setnb ch 0x00000017 lea eax, dword ptr [edi+24h] 0x0000001a sbb ah, bh 0x0000001c pop ebx 0x0000001d sub esp, 10h 0x00000020 jmp 00007F03F04CFE26h 0x00000022 jnle 00007F03F04CFE4Ah 0x00000024 xchg dx, si 0x00000027 sub esp, 07h 0x0000002a xchg dword ptr [esp+09h], esi 0x0000002e lea esp, dword ptr [esp+03h] 0x00000032 add esp, 14h 0x00000035 jo 00007F03F04CFE49h 0x00000037 jno 00007F03F04CFE2Ah 0x00000039 mov esi, dword ptr [esp] 0x0000003c lea esp, dword ptr [esp+04h] 0x00000040 jmp 00007F03F04C2FECh 0x00000045 mov ebx, edi 0x00000047 lea edx, dword ptr [ebp-000000D4h] 0x0000004d rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C117F2A second address: 000000006C118032 instructions: 0x00000000 rdtsc 0x00000002 bswap edx 0x00000004 dec dl 0x00000006 jnc 00007F03F114D62Dh 0x00000008 jmp 00007F03F114D65Ah 0x0000000a lea ecx, dword ptr [esp+46h] 0x0000000e setl cl 0x00000011 xor ecx, esp 0x00000013 jmp 00007F03F114D695h 0x00000015 btc eax, edi 0x00000018 mov ch, 37h 0x0000001a mov eax, 261E6951h 0x0000001f jmp 00007F03F114D650h 0x00000021 dec edi 0x00000022 mov ecx, 956D842Eh 0x00000027 push edi 0x00000028 mov ecx, dword ptr [esp] 0x0000002b xchg al, dl 0x0000002d jmp 00007F03F114D6F4h 0x00000032 push word ptr [esp+03h] 0x00000037 jnc 00007F03F114D655h 0x00000039 lea esp, dword ptr [esp+02h] 0x0000003d jmp 00007F03F114D70Eh 0x00000042 lea esp, dword ptr [esp+04h] 0x00000046 xor edi, 57188A76h 0x0000004c rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C112BD3 second address: 000000006C112BB2 instructions: 0x00000000 rdtsc 0x00000002 mov dx, bp 0x00000005 jmp 00007F03F114D62Bh 0x00000007 dec cl 0x00000009 mov ax, 47E1h 0x0000000d xchg ax, dx 0x0000000f mov dh, 48h 0x00000011 xchg al, dl 0x00000013 jmp 00007F03F114D681h 0x00000015 xchg ah, dl 0x00000017 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C123C6A second address: 000000006C123CE7 instructions: 0x00000000 rdtsc 0x00000002 neg eax 0x00000004 push dword ptr [esp] 0x00000007 retn 0004h 0x0000000a add esi, 04h 0x0000000d xchg cl, dl 0x0000000f not dl 0x00000011 jmp 00007F03F04CFEA8h 0x00000016 push edi 0x00000017 mov cx, word ptr [esp] 0x0000001b mov ax, bp 0x0000001e xchg ecx, edx 0x00000020 mov edx, dword ptr [esp] 0x00000023 jmp 00007F03F04CFE44h 0x00000025 push ebp 0x00000026 xchg ebp, eax 0x00000028 mov ecx, 14D54B91h 0x0000002d neg edi 0x0000002f jbe 00007F03F04CFDF4h 0x00000031 jmp 00007F03F04CFEA9h 0x00000036 push esi 0x00000037 btc si, bx 0x0000003b jnle 00007F03F04CFDEFh 0x0000003d mov ebp, esp 0x0000003f sets ah 0x00000042 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C123CE7 second address: 000000006C1159BC instructions: 0x00000000 rdtsc 0x00000002 mov eax, A6DEB4F0h 0x00000007 lea ebp, dword ptr [00000000h+ebp*4] 0x0000000e jmp 00007F03F114D635h 0x00000010 lea edx, dword ptr [ecx+edx] 0x00000013 sub esp, 01h 0x00000016 jno 00007F03F114D6EBh 0x00000018 lea esp, dword ptr [esp+01h] 0x0000001c pop ebp 0x0000001d lea eax, dword ptr [ecx-7Eh] 0x00000020 rol cl, 00000000h 0x00000023 jns 00007F03F114D5EEh 0x00000029 call 00007F03F114D6A3h 0x0000002e jmp 00007F03F114D68Ch 0x00000030 pop edx 0x00000031 pop edi 0x00000032 btr dx, di 0x00000036 jmp 00007F03F114D6A9h 0x00000038 jne 00007F03F114D63Dh 0x0000003a rcr cl, 1 0x0000003c bsf esi, edx 0x0000003f bsf edx, edi 0x00000042 jmp 00007F03F114D89Bh 0x00000047 pop esi 0x00000048 jmp 00007F03F113EF84h 0x0000004d mov ebx, edi 0x0000004f stc 0x00000050 jc 00007F03F114D7BCh 0x00000056 inc cx 0x00000058 mov dh, byte ptr [esp] 0x0000005b inc eax 0x0000005c rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C1176EA second address: 000000006C117ECD instructions: 0x00000000 rdtsc 0x00000002 setnb ch 0x00000005 pushad 0x00000006 jmp 00007F03F04D05FAh 0x0000000b add ebp, 04h 0x0000000e rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C159310 second address: 000000006C1592ED instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007F03F114D63Eh 0x00000005 pop dword ptr [ebp+00h] 0x00000008 mov ecx, dword ptr [esp] 0x0000000b lea edx, dword ptr [ebx+edi] 0x0000000e setbe ah 0x00000011 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C15D864 second address: 000000006C1123C2 instructions: 0x00000000 rdtsc 0x00000002 stc 0x00000003 jc 00007F03F04CFE07h 0x00000005 pushfd 0x00000006 jmp 00007F03F04CFE41h 0x00000008 mov byte ptr [esp+01h], dl 0x0000000c sub esi, 08h 0x0000000f clc 0x00000010 js 00007F03F04CFFC1h 0x00000016 jns 00007F03F04CFF5Eh 0x0000001c pushad 0x0000001d jmp 00007F03F04CFE7Dh 0x0000001f xchg edx, ecx 0x00000021 call 00007F03F04CFCF3h 0x00000026 mov byte ptr [esp+01h], ah 0x0000002a mov dword ptr [esi], ecx 0x0000002c jmp 00007F03F04CFDDDh 0x0000002e cmc 0x0000002f jle 00007F03F04CFDFFh 0x00000031 lea ecx, dword ptr [edi-625E3360h] 0x00000037 mov cl, bl 0x00000039 jmp 00007F03F04CFE26h 0x0000003b mov dword ptr [esi+04h], eax 0x0000003e mov ecx, esp 0x00000040 ror cx, cl 0x00000043 jnle 00007F03F04CFDF1h 0x00000045 jle 00007F03F04CFE2Ah 0x00000047 bswap eax 0x00000049 jmp 00007F03F04A6B40h 0x0000004e jmp 00007F03F04CFE6Fh 0x00000050 mov dx, word ptr [esp] 0x00000054 mov ecx, 4842D8C4h 0x00000059 jmp 00007F03F04CFDCAh 0x0000005b lea edx, dword ptr [edi+50h] 0x0000005e mov al, bl 0x00000060 bswap eax 0x00000062 cmc 0x00000063 jne 00007F03F04CFE4Fh 0x00000065 jmp 00007F03F04CFE9Dh 0x00000067 cmp esi, edx 0x00000069 ja 00007F03F04ADAE7h 0x0000006f movzx ecx, byte ptr [ebp-01h] 0x00000073 call 00007F03F04CFE5Fh 0x00000078 mov edx, dword ptr [esp] 0x0000007b setl ah 0x0000007e pushfd 0x0000007f rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C169BC2 second address: 000000006C1123C2 instructions: 0x00000000 rdtsc 0x00000002 sub esp, 14h 0x00000005 jl 00007F03F04CFE03h 0x00000007 jnl 00007F03F04CFEAAh 0x0000000d push si 0x0000000f lea esp, dword ptr [esp+02h] 0x00000013 jmp 00007F03F04CFDC2h 0x00000015 sub esi, 08h 0x00000018 call 00007F03F04CFE07h 0x0000001d xchg edx, ecx 0x0000001f push bx 0x00000021 lea esp, dword ptr [esp+02h] 0x00000025 jmp 00007F03F04CFE4Ch 0x00000027 mov dword ptr [esi], ecx 0x00000029 sbb ecx, CB232F3Fh 0x0000002f jnc 00007F03F04CFE02h 0x00000031 mov ecx, esp 0x00000033 jmp 00007F03F04CFEB8h 0x00000038 bts cx, bx 0x0000003c jmp 00007F03F04CFD8Eh 0x00000041 mov ecx, esi 0x00000043 add ecx, 04h 0x00000046 jmp 00007F03F04CFE6Dh 0x00000048 jo 00007F03F04CFDD9h 0x0000004a mov dword ptr [ecx], eax 0x0000004c xchg ax, cx 0x0000004e jmp 00007F03F04CFDF4h 0x00000050 add ecx, esp 0x00000052 setnle al 0x00000055 btc ecx, esi 0x00000058 jmp 00007F03F049A7B6h 0x0000005d jmp 00007F03F04CFE6Fh 0x0000005f mov dx, word ptr [esp] 0x00000063 mov ecx, 4842D8C4h 0x00000068 jmp 00007F03F04CFDCAh 0x0000006a lea edx, dword ptr [edi+50h] 0x0000006d mov al, bl 0x0000006f bswap eax 0x00000071 cmc 0x00000072 jne 00007F03F04CFE4Fh 0x00000074 jmp 00007F03F04CFE9Dh 0x00000076 cmp esi, edx 0x00000078 ja 00007F03F04ADAE7h 0x0000007e movzx ecx, byte ptr [ebp-01h] 0x00000082 call 00007F03F04CFE5Fh 0x00000087 mov edx, dword ptr [esp] 0x0000008a setl ah 0x0000008d pushfd 0x0000008e rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C1918F7 second address: 000000006C112322 instructions: 0x00000000 rdtsc 0x00000002 mov ecx, C0ADFBF7h 0x00000007 jmp 00007F03F114D698h 0x00000009 pushfd 0x0000000a pop dword ptr [esi] 0x0000000c call 00007F03F114D676h 0x00000011 mov al, 81h 0x00000013 jmp 00007F03F10CE0A0h 0x00000018 mov ah, byte ptr [esp] 0x0000001b bswap edx 0x0000001d mov eax, edx 0x0000001f lea ecx, dword ptr [edi+50h] 0x00000022 jmp 00007F03F114D621h 0x00000024 stc 0x00000025 jnc 00007F03F114D64Eh 0x00000027 bsf edx, ebp 0x0000002a rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C1625FD second address: 000000006C1626BB instructions: 0x00000000 rdtsc 0x00000002 mov dword ptr [esp+14h], esi 0x00000006 popad 0x00000007 mov word ptr [edx], cx 0x0000000a btc eax, edx 0x0000000d jnc 00007F03F114D64Dh 0x0000000f call 00007F03F114D6B3h 0x00000014 push sp 0x00000016 lea eax, dword ptr [esi+ebp] 0x00000019 lea eax, dword ptr [ebx-5Ah] 0x0000001c mov dx, word ptr [esp+01h] 0x00000021 xchg eax, ecx 0x00000022 jmp 00007F03F114D6BBh 0x00000024 lea esp, dword ptr [esp+02h] 0x00000028 xchg dword ptr [esp], esi 0x0000002b mov eax, 780BAA39h 0x00000030 bswap ecx 0x00000032 mov cx, si 0x00000035 xchg ecx, edx 0x00000037 jmp 00007F03F114D647h 0x00000039 lea esi, dword ptr [esi+54h] 0x0000003c mov edx, dword ptr [esp] 0x0000003f mov eax, dword ptr [esp] 0x00000042 lea ecx, dword ptr [edx+000001E0h] 0x00000048 jmp 00007F03F114D6A2h 0x0000004a xchg dword ptr [esp], esi 0x0000004d xchg dl, dh 0x0000004f not edx 0x00000051 bsf dx, ax 0x00000055 mov al, AFh 0x00000057 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C1626BB second address: 000000006C1123C2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F03F04CFDFBh 0x00000004 push dword ptr [esp] 0x00000007 retn 0004h 0x0000000a mov edx, edi 0x0000000c mov ecx, B7952469h 0x00000011 jmp 00007F03F04A1DD2h 0x00000016 jmp 00007F03F04CFE6Fh 0x00000018 mov dx, word ptr [esp] 0x0000001c mov ecx, 4842D8C4h 0x00000021 jmp 00007F03F04CFDCAh 0x00000023 lea edx, dword ptr [edi+50h] 0x00000026 mov al, bl 0x00000028 bswap eax 0x0000002a cmc 0x0000002b jne 00007F03F04CFE4Fh 0x0000002d jmp 00007F03F04CFE9Dh 0x0000002f cmp esi, edx 0x00000031 ja 00007F03F04ADAE7h 0x00000037 movzx ecx, byte ptr [ebp-01h] 0x0000003b call 00007F03F04CFE5Fh 0x00000040 mov edx, dword ptr [esp] 0x00000043 setl ah 0x00000046 pushfd 0x00000047 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C15F91C second address: 000000006C15F939 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F03F114D650h 0x00000004 lea eax, dword ptr [ecx+ebp] 0x00000007 jmp 00007F03F114D6A5h 0x00000009 mov cx, word ptr [esi] 0x0000000c rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C15F939 second address: 000000006C15F9AE instructions: 0x00000000 rdtsc 0x00000002 dec dx 0x00000004 jo 00007F03F04CFE03h 0x00000006 jno 00007F03F04CFE01h 0x00000008 jmp 00007F03F04CFE57h 0x0000000a sub esi, 02h 0x0000000d cmp dh, FFFFFFDBh 0x00000010 jno 00007F03F04CFE04h 0x00000012 mov eax, edx 0x00000014 lea edx, dword ptr [00000000h+ebp*4] 0x0000001b jmp 00007F03F04CFE71h 0x0000001d add word ptr [esi+04h], cx 0x00000021 mov dx, word ptr [esp] 0x00000025 mov dl, cl 0x00000027 not dh 0x00000029 jmp 00007F03F04CFE85h 0x0000002b pushfd 0x0000002c jmp 00007F03F04CFDBCh 0x0000002e pop dword ptr [esi] 0x00000030 setnb dl 0x00000033 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C15F9AE second address: 000000006C15FA52 instructions: 0x00000000 rdtsc 0x00000002 call 00007F03F114D981h 0x00000007 pop eax 0x00000008 call 00007F03F114D400h 0x0000000d rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C15FA52 second address: 000000006C15FA81 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F03F04CFE08h 0x00000004 push esi 0x00000005 xchg dx, ax 0x00000008 mov byte ptr [esp+01h], dh 0x0000000c xchg dword ptr [esp+04h], ebp 0x00000010 push bp 0x00000012 jmp 00007F03F04CFFADh 0x00000017 lea edx, dword ptr [00000000h+ecx*4] 0x0000001e mov dl, C5h 0x00000020 lea esp, dword ptr [esp+02h] 0x00000024 lea ebp, dword ptr [ebp-0002B6CEh] 0x0000002a lea eax, dword ptr [ecx+ebp] 0x0000002d push si 0x0000002f jmp 00007F03F04CFCB0h 0x00000034 mov dh, ch 0x00000036 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C15FA81 second address: 000000006C1123C2 instructions: 0x00000000 rdtsc 0x00000002 lea esp, dword ptr [esp+01h] 0x00000006 lea esp, dword ptr [esp+01h] 0x0000000a xchg dword ptr [esp+04h], ebp 0x0000000e mov dl, byte ptr [esp] 0x00000011 jmp 00007F03F114D634h 0x00000013 mov dx, DBE7h 0x00000017 mov dh, byte ptr [esp] 0x0000001a lea eax, dword ptr [esp+edi] 0x0000001d push dword ptr [esp+04h] 0x00000021 retn 0008h 0x00000024 jmp 00007F03F114D6BFh 0x00000026 mov dx, word ptr [esp] 0x0000002a mov ecx, 4842D8C4h 0x0000002f jmp 00007F03F114D61Ah 0x00000031 lea edx, dword ptr [edi+50h] 0x00000034 mov al, bl 0x00000036 bswap eax 0x00000038 cmc 0x00000039 jne 00007F03F114D69Fh 0x0000003b jmp 00007F03F114D6EDh 0x0000003d cmp esi, edx 0x0000003f ja 00007F03F112B337h 0x00000045 movzx ecx, byte ptr [ebp-01h] 0x00000049 call 00007F03F114D6AFh 0x0000004e mov edx, dword ptr [esp] 0x00000051 setl ah 0x00000054 pushfd 0x00000055 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C17D1DF second address: 000000006C17D2F3 instructions: 0x00000000 rdtsc 0x00000002 mov cx, word ptr [ebp+00h] 0x00000006 or dh, al 0x00000008 jp 00007F03F04CFE02h 0x0000000a jnp 00007F03F04CFE2Ah 0x0000000c xchg eax, edx 0x0000000d xchg ax, dx 0x0000000f jmp 00007F03F04CFEA3h 0x00000014 sub ebp, 02h 0x00000017 lea eax, dword ptr [121ADBD9h] 0x0000001d mov eax, dword ptr [esp] 0x00000020 shr edx, cl 0x00000022 jne 00007F03F04D0041h 0x00000028 jmp 00007F03F04CFC63h 0x0000002d mov dh, 9Fh 0x0000002f add word ptr [ebp+04h], cx 0x00000033 bswap eax 0x00000035 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C210638 second address: 000000006C21065A instructions: 0x00000000 rdtsc 0x00000002 mov esi, ebp 0x00000004 bswap edi 0x00000006 mov al, byte ptr [esp+12h] 0x0000000a jmp 00007F03F04CFE38h 0x0000000c rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C21065A second address: 000000006C210743 instructions: 0x00000000 rdtsc 0x00000002 mov bx, 17F5h 0x00000006 lea edi, dword ptr [00000000h+esi*4] 0x0000000d mov dword ptr [esp+16h], eax 0x00000011 mov dl, C5h 0x00000013 not edi 0x00000015 jmp 00007F03F114D7AAh 0x0000001a mov edi, dword ptr [esp+0Eh] 0x0000001e xchg word ptr [esp], si 0x00000022 mov word ptr [esp+1Eh], cx 0x00000027 mov di, word ptr [esp+20h] 0x0000002c setns bh 0x0000002f xchg dh, ch 0x00000031 jmp 00007F03F114D575h 0x00000036 pop esi 0x00000037 mov edi, dword ptr [esp+06h] 0x0000003b xchg byte ptr [esp+0Eh], al 0x0000003f lea esp, dword ptr [esp+28h] 0x00000043 mov ch, byte ptr [esp] 0x00000046 mov dl, byte ptr [esp] 0x00000049 jmp 00007F03F114D633h 0x0000004b mov bh, byte ptr [esp] 0x0000004e mov byte ptr [esp], ah 0x00000051 call 00007F03F114D676h 0x00000056 xchg bh, al 0x00000058 mov ah, B5h 0x0000005a xchg eax, esi 0x0000005b mov ch, 27h 0x0000005d jmp 00007F03F114D705h 0x00000062 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C210638 second address: 000000006C21065A instructions: 0x00000000 rdtsc 0x00000002 mov esi, ebp 0x00000004 bswap edi 0x00000006 mov al, byte ptr [esp+12h] 0x0000000a jmp 00007F03F114D688h 0x0000000c rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C21065A second address: 000000006C210743 instructions: 0x00000000 rdtsc 0x00000002 mov bx, 17F5h 0x00000006 lea edi, dword ptr [00000000h+esi*4] 0x0000000d mov dword ptr [esp+16h], eax 0x00000011 mov dl, C5h 0x00000013 not edi 0x00000015 jmp 00007F03F04CFF5Ah 0x0000001a mov edi, dword ptr [esp+0Eh] 0x0000001e xchg word ptr [esp], si 0x00000022 mov word ptr [esp+1Eh], cx 0x00000027 mov di, word ptr [esp+20h] 0x0000002c setns bh 0x0000002f xchg dh, ch 0x00000031 jmp 00007F03F04CFD25h 0x00000036 pop esi 0x00000037 mov edi, dword ptr [esp+06h] 0x0000003b xchg byte ptr [esp+0Eh], al 0x0000003f lea esp, dword ptr [esp+28h] 0x00000043 mov ch, byte ptr [esp] 0x00000046 mov dl, byte ptr [esp] 0x00000049 jmp 00007F03F04CFDE3h 0x0000004b mov bh, byte ptr [esp] 0x0000004e mov byte ptr [esp], ah 0x00000051 call 00007F03F04CFE26h 0x00000056 xchg bh, al 0x00000058 mov ah, B5h 0x0000005a xchg eax, esi 0x0000005b mov ch, 27h 0x0000005d jmp 00007F03F04CFEB5h 0x00000062 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0247A24E mov eax, dword ptr fs:[00000030h] | 3_2_0247A24E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0247A24E mov ecx, dword ptr fs:[00000030h] | 3_2_0247A24E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0248625D mov eax, dword ptr fs:[00000030h] | 3_2_0248625D |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0248625D mov eax, dword ptr fs:[00000030h] | 3_2_0248625D |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0248625D mov ecx, dword ptr fs:[00000030h] | 3_2_0248625D |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024C3204 mov eax, dword ptr fs:[00000030h] | 3_2_024C3204 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024C3204 mov eax, dword ptr fs:[00000030h] | 3_2_024C3204 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024C3204 mov eax, dword ptr fs:[00000030h] | 3_2_024C3204 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024C3204 mov ecx, dword ptr fs:[00000030h] | 3_2_024C3204 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024C3204 mov eax, dword ptr fs:[00000030h] | 3_2_024C3204 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024C3204 mov ecx, dword ptr fs:[00000030h] | 3_2_024C3204 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024C5206 mov ecx, dword ptr fs:[00000030h] | 3_2_024C5206 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024C5206 mov ecx, dword ptr fs:[00000030h] | 3_2_024C5206 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024A528E mov eax, dword ptr fs:[00000030h] | 3_2_024A528E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024A528E mov eax, dword ptr fs:[00000030h] | 3_2_024A528E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024ADA81 mov eax, dword ptr fs:[00000030h] | 3_2_024ADA81 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024ADA81 mov eax, dword ptr fs:[00000030h] | 3_2_024ADA81 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0247EA95 mov eax, dword ptr fs:[00000030h] | 3_2_0247EA95 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024AD29D mov eax, dword ptr fs:[00000030h] | 3_2_024AD29D |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024AD29D mov eax, dword ptr fs:[00000030h] | 3_2_024AD29D |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02473290 mov eax, dword ptr fs:[00000030h] | 3_2_02473290 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02473290 mov eax, dword ptr fs:[00000030h] | 3_2_02473290 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02473290 mov eax, dword ptr fs:[00000030h] | 3_2_02473290 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0247D299 mov eax, dword ptr fs:[00000030h] | 3_2_0247D299 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0247D299 mov ecx, dword ptr fs:[00000030h] | 3_2_0247D299 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0247D299 mov eax, dword ptr fs:[00000030h] | 3_2_0247D299 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0247D299 mov eax, dword ptr fs:[00000030h] | 3_2_0247D299 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0247D299 mov eax, dword ptr fs:[00000030h] | 3_2_0247D299 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0247D299 mov eax, dword ptr fs:[00000030h] | 3_2_0247D299 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024CD343 mov eax, dword ptr fs:[00000030h] | 3_2_024CD343 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024CD343 mov ecx, dword ptr fs:[00000030h] | 3_2_024CD343 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024C4351 mov eax, dword ptr fs:[00000030h] | 3_2_024C4351 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024C4351 mov ecx, dword ptr fs:[00000030h] | 3_2_024C4351 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024C4351 mov ecx, dword ptr fs:[00000030h] | 3_2_024C4351 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0248A36E mov eax, dword ptr fs:[00000030h] | 3_2_0248A36E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0248BB7E mov ecx, dword ptr fs:[00000030h] | 3_2_0248BB7E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024D132E mov eax, dword ptr fs:[00000030h] | 3_2_024D132E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024D132E mov eax, dword ptr fs:[00000030h] | 3_2_024D132E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024D132E mov eax, dword ptr fs:[00000030h] | 3_2_024D132E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024D132E mov eax, dword ptr fs:[00000030h] | 3_2_024D132E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0247E335 mov eax, dword ptr fs:[00000030h] | 3_2_0247E335 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0247E335 mov eax, dword ptr fs:[00000030h] | 3_2_0247E335 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0247E335 mov eax, dword ptr fs:[00000030h] | 3_2_0247E335 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0247E335 mov eax, dword ptr fs:[00000030h] | 3_2_0247E335 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0247E335 mov eax, dword ptr fs:[00000030h] | 3_2_0247E335 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024C3333 mov eax, dword ptr fs:[00000030h] | 3_2_024C3333 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024AF3E4 mov eax, dword ptr fs:[00000030h] | 3_2_024AF3E4 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024AF3E4 mov ecx, dword ptr fs:[00000030h] | 3_2_024AF3E4 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0248B3FC mov eax, dword ptr fs:[00000030h] | 3_2_0248B3FC |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0248B3FC mov eax, dword ptr fs:[00000030h] | 3_2_0248B3FC |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024A3BB2 mov ecx, dword ptr fs:[00000030h] | 3_2_024A3BB2 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0248304A mov eax, dword ptr fs:[00000030h] | 3_2_0248304A |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024AE04F mov eax, dword ptr fs:[00000030h] | 3_2_024AE04F |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024AE04F mov eax, dword ptr fs:[00000030h] | 3_2_024AE04F |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024AE04F mov eax, dword ptr fs:[00000030h] | 3_2_024AE04F |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024AC844 mov eax, dword ptr fs:[00000030h] | 3_2_024AC844 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024AC844 mov ecx, dword ptr fs:[00000030h] | 3_2_024AC844 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0248C05E mov eax, dword ptr fs:[00000030h] | 3_2_0248C05E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0248C05E mov ecx, dword ptr fs:[00000030h] | 3_2_0248C05E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0247387E mov eax, dword ptr fs:[00000030h] | 3_2_0247387E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0247387E mov ecx, dword ptr fs:[00000030h] | 3_2_0247387E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0247387E mov eax, dword ptr fs:[00000030h] | 3_2_0247387E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024CC009 mov eax, dword ptr fs:[00000030h] | 3_2_024CC009 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024CC009 mov ecx, dword ptr fs:[00000030h] | 3_2_024CC009 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024C3819 mov eax, dword ptr fs:[00000030h] | 3_2_024C3819 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024C3819 mov eax, dword ptr fs:[00000030h] | 3_2_024C3819 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0248381E mov eax, dword ptr fs:[00000030h] | 3_2_0248381E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0248381E mov eax, dword ptr fs:[00000030h] | 3_2_0248381E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0247501E mov eax, dword ptr fs:[00000030h] | 3_2_0247501E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0247501E mov ecx, dword ptr fs:[00000030h] | 3_2_0247501E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0247501E mov eax, dword ptr fs:[00000030h] | 3_2_0247501E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024A5036 mov eax, dword ptr fs:[00000030h] | 3_2_024A5036 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024A5036 mov eax, dword ptr fs:[00000030h] | 3_2_024A5036 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024C7830 mov eax, dword ptr fs:[00000030h] | 3_2_024C7830 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024C7830 mov ecx, dword ptr fs:[00000030h] | 3_2_024C7830 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024860CE mov eax, dword ptr fs:[00000030h] | 3_2_024860CE |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024860CE mov eax, dword ptr fs:[00000030h] | 3_2_024860CE |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024860CE mov ecx, dword ptr fs:[00000030h] | 3_2_024860CE |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0248A0CE mov eax, dword ptr fs:[00000030h] | 3_2_0248A0CE |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0248A0CE mov eax, dword ptr fs:[00000030h] | 3_2_0248A0CE |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0248A0CE mov eax, dword ptr fs:[00000030h] | 3_2_0248A0CE |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024CD0C3 mov eax, dword ptr fs:[00000030h] | 3_2_024CD0C3 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024830EE mov eax, dword ptr fs:[00000030h] | 3_2_024830EE |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024830EE mov eax, dword ptr fs:[00000030h] | 3_2_024830EE |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0247308B mov eax, dword ptr fs:[00000030h] | 3_2_0247308B |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0247308B mov eax, dword ptr fs:[00000030h] | 3_2_0247308B |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02476895 mov eax, dword ptr fs:[00000030h] | 3_2_02476895 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02476895 mov eax, dword ptr fs:[00000030h] | 3_2_02476895 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02476895 mov eax, dword ptr fs:[00000030h] | 3_2_02476895 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024C7948 mov ecx, dword ptr fs:[00000030h] | 3_2_024C7948 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024BD940 mov esi, dword ptr fs:[00000030h] | 3_2_024BD940 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024CE142 mov eax, dword ptr fs:[00000030h] | 3_2_024CE142 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024CE142 mov ecx, dword ptr fs:[00000030h] | 3_2_024CE142 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024AF104 mov eax, dword ptr fs:[00000030h] | 3_2_024AF104 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024AF104 mov ecx, dword ptr fs:[00000030h] | 3_2_024AF104 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02486906 mov ecx, dword ptr fs:[00000030h] | 3_2_02486906 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02486906 mov eax, dword ptr fs:[00000030h] | 3_2_02486906 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024B513E mov eax, dword ptr fs:[00000030h] | 3_2_024B513E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024B513E mov eax, dword ptr fs:[00000030h] | 3_2_024B513E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024B513E mov eax, dword ptr fs:[00000030h] | 3_2_024B513E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024B513E mov eax, dword ptr fs:[00000030h] | 3_2_024B513E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024B513E mov ecx, dword ptr fs:[00000030h] | 3_2_024B513E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024C41C1 mov eax, dword ptr fs:[00000030h] | 3_2_024C41C1 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0247D1D2 mov ecx, dword ptr fs:[00000030h] | 3_2_0247D1D2 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0247D1D2 mov eax, dword ptr fs:[00000030h] | 3_2_0247D1D2 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024C39B1 mov eax, dword ptr fs:[00000030h] | 3_2_024C39B1 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024C39B1 mov eax, dword ptr fs:[00000030h] | 3_2_024C39B1 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024C39B1 mov eax, dword ptr fs:[00000030h] | 3_2_024C39B1 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024C39B1 mov eax, dword ptr fs:[00000030h] | 3_2_024C39B1 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024C39B1 mov eax, dword ptr fs:[00000030h] | 3_2_024C39B1 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024C39B1 mov ecx, dword ptr fs:[00000030h] | 3_2_024C39B1 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024BB640 mov eax, dword ptr fs:[00000030h] | 3_2_024BB640 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024D166A mov eax, dword ptr fs:[00000030h] | 3_2_024D166A |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0248A665 mov eax, dword ptr fs:[00000030h] | 3_2_0248A665 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024A5672 mov eax, dword ptr fs:[00000030h] | 3_2_024A5672 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024A5672 mov eax, dword ptr fs:[00000030h] | 3_2_024A5672 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024D063D mov eax, dword ptr fs:[00000030h] | 3_2_024D063D |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024D063D mov ecx, dword ptr fs:[00000030h] | 3_2_024D063D |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02475E3E mov eax, dword ptr fs:[00000030h] | 3_2_02475E3E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02484E34 mov eax, dword ptr fs:[00000030h] | 3_2_02484E34 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02484E34 mov eax, dword ptr fs:[00000030h] | 3_2_02484E34 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024C1EC4 mov eax, dword ptr fs:[00000030h] | 3_2_024C1EC4 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024C1EC4 mov ecx, dword ptr fs:[00000030h] | 3_2_024C1EC4 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02482E8E mov eax, dword ptr fs:[00000030h] | 3_2_02482E8E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02482E8E mov eax, dword ptr fs:[00000030h] | 3_2_02482E8E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024AC6BE mov eax, dword ptr fs:[00000030h] | 3_2_024AC6BE |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024AC6BE mov eax, dword ptr fs:[00000030h] | 3_2_024AC6BE |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024A36BC mov eax, dword ptr fs:[00000030h] | 3_2_024A36BC |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0248A6BE mov eax, dword ptr fs:[00000030h] | 3_2_0248A6BE |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0248A6BE mov eax, dword ptr fs:[00000030h] | 3_2_0248A6BE |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0248A6BE mov eax, dword ptr fs:[00000030h] | 3_2_0248A6BE |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02482F42 mov eax, dword ptr fs:[00000030h] | 3_2_02482F42 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02482F42 mov eax, dword ptr fs:[00000030h] | 3_2_02482F42 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024C4F5E mov eax, dword ptr fs:[00000030h] | 3_2_024C4F5E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024C4F5E mov ecx, dword ptr fs:[00000030h] | 3_2_024C4F5E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024C4F5E mov ecx, dword ptr fs:[00000030h] | 3_2_024C4F5E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0248675D mov ecx, dword ptr fs:[00000030h] | 3_2_0248675D |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0248675D mov eax, dword ptr fs:[00000030h] | 3_2_0248675D |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02485F55 mov eax, dword ptr fs:[00000030h] | 3_2_02485F55 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02485F55 mov eax, dword ptr fs:[00000030h] | 3_2_02485F55 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0248B76D mov eax, dword ptr fs:[00000030h] | 3_2_0248B76D |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0248B76D mov eax, dword ptr fs:[00000030h] | 3_2_0248B76D |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0248B76D mov eax, dword ptr fs:[00000030h] | 3_2_0248B76D |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0248470E mov eax, dword ptr fs:[00000030h] | 3_2_0248470E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0248470E mov eax, dword ptr fs:[00000030h] | 3_2_0248470E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0248470E mov eax, dword ptr fs:[00000030h] | 3_2_0248470E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0248470E mov eax, dword ptr fs:[00000030h] | 3_2_0248470E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02473F0E mov ecx, dword ptr fs:[00000030h] | 3_2_02473F0E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024857C8 mov eax, dword ptr fs:[00000030h] | 3_2_024857C8 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024857C8 mov eax, dword ptr fs:[00000030h] | 3_2_024857C8 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024857C8 mov eax, dword ptr fs:[00000030h] | 3_2_024857C8 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024857C8 mov eax, dword ptr fs:[00000030h] | 3_2_024857C8 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024B8FD1 mov eax, dword ptr fs:[00000030h] | 3_2_024B8FD1 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02473F9E mov eax, dword ptr fs:[00000030h] | 3_2_02473F9E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02473F9E mov ecx, dword ptr fs:[00000030h] | 3_2_02473F9E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02472F9E mov eax, dword ptr fs:[00000030h] | 3_2_02472F9E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024AE7BA mov eax, dword ptr fs:[00000030h] | 3_2_024AE7BA |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024AE7BA mov eax, dword ptr fs:[00000030h] | 3_2_024AE7BA |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02473446 mov ebx, dword ptr fs:[00000030h] | 3_2_02473446 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02473446 mov eax, dword ptr fs:[00000030h] | 3_2_02473446 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02473446 mov ecx, dword ptr fs:[00000030h] | 3_2_02473446 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02473446 mov eax, dword ptr fs:[00000030h] | 3_2_02473446 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024A4C4E cmp dword ptr fs:[00000030h], ebx | 3_2_024A4C4E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024A4C4E mov eax, dword ptr fs:[00000030h] | 3_2_024A4C4E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024A4C4E mov eax, dword ptr fs:[00000030h] | 3_2_024A4C4E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024A4C4E mov eax, dword ptr fs:[00000030h] | 3_2_024A4C4E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024A3C56 mov eax, dword ptr fs:[00000030h] | 3_2_024A3C56 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024A3C56 mov eax, dword ptr fs:[00000030h] | 3_2_024A3C56 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024BA469 mov eax, dword ptr fs:[00000030h] | 3_2_024BA469 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024BA469 mov ecx, dword ptr fs:[00000030h] | 3_2_024BA469 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0248BC7E mov eax, dword ptr fs:[00000030h] | 3_2_0248BC7E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02484C2E mov eax, dword ptr fs:[00000030h] | 3_2_02484C2E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02484C2E mov eax, dword ptr fs:[00000030h] | 3_2_02484C2E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02484C2E mov eax, dword ptr fs:[00000030h] | 3_2_02484C2E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02484C2E mov eax, dword ptr fs:[00000030h] | 3_2_02484C2E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0248C43D mov eax, dword ptr fs:[00000030h] | 3_2_0248C43D |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024D14C0 mov eax, dword ptr fs:[00000030h] | 3_2_024D14C0 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024AECC4 mov eax, dword ptr fs:[00000030h] | 3_2_024AECC4 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024CD4F8 mov eax, dword ptr fs:[00000030h] | 3_2_024CD4F8 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024CD4F8 mov ecx, dword ptr fs:[00000030h] | 3_2_024CD4F8 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024AE49B mov eax, dword ptr fs:[00000030h] | 3_2_024AE49B |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024AE49B mov eax, dword ptr fs:[00000030h] | 3_2_024AE49B |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024C8549 mov eax, dword ptr fs:[00000030h] | 3_2_024C8549 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0247BD5E mov eax, dword ptr fs:[00000030h] | 3_2_0247BD5E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024C4568 mov eax, dword ptr fs:[00000030h] | 3_2_024C4568 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024C4568 mov ecx, dword ptr fs:[00000030h] | 3_2_024C4568 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024C4568 mov ecx, dword ptr fs:[00000030h] | 3_2_024C4568 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024BB564 mov eax, dword ptr fs:[00000030h] | 3_2_024BB564 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024BB564 mov ecx, dword ptr fs:[00000030h] | 3_2_024BB564 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024BB564 mov eax, dword ptr fs:[00000030h] | 3_2_024BB564 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02482D0E mov eax, dword ptr fs:[00000030h] | 3_2_02482D0E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02482D0E mov eax, dword ptr fs:[00000030h] | 3_2_02482D0E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02474D1E mov eax, dword ptr fs:[00000030h] | 3_2_02474D1E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02474D1E mov eax, dword ptr fs:[00000030h] | 3_2_02474D1E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02474D1E mov eax, dword ptr fs:[00000030h] | 3_2_02474D1E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024A3D2C mov eax, dword ptr fs:[00000030h] | 3_2_024A3D2C |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024A3D2C mov ecx, dword ptr fs:[00000030h] | 3_2_024A3D2C |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024855CA mov eax, dword ptr fs:[00000030h] | 3_2_024855CA |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024855CA mov eax, dword ptr fs:[00000030h] | 3_2_024855CA |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024855CA mov eax, dword ptr fs:[00000030h] | 3_2_024855CA |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024B4DC8 mov eax, dword ptr fs:[00000030h] | 3_2_024B4DC8 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024B4DC8 mov ecx, dword ptr fs:[00000030h] | 3_2_024B4DC8 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02484DCC mov eax, dword ptr fs:[00000030h] | 3_2_02484DCC |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02484DCC mov eax, dword ptr fs:[00000030h] | 3_2_02484DCC |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02484DCC mov eax, dword ptr fs:[00000030h] | 3_2_02484DCC |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02484DCC mov eax, dword ptr fs:[00000030h] | 3_2_02484DCC |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024C75E9 mov eax, dword ptr fs:[00000030h] | 3_2_024C75E9 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024C75E9 mov ecx, dword ptr fs:[00000030h] | 3_2_024C75E9 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024A358A mov eax, dword ptr fs:[00000030h] | 3_2_024A358A |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0248BD9E mov eax, dword ptr fs:[00000030h] | 3_2_0248BD9E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024BA595 mov eax, dword ptr fs:[00000030h] | 3_2_024BA595 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024BA595 mov eax, dword ptr fs:[00000030h] | 3_2_024BA595 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024BA595 mov eax, dword ptr fs:[00000030h] | 3_2_024BA595 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024BA595 mov eax, dword ptr fs:[00000030h] | 3_2_024BA595 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024BA595 mov ecx, dword ptr fs:[00000030h] | 3_2_024BA595 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02486E2E mov eax, dword ptr fs:[00000030h] | 3_2_02486E2E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02486E2E mov eax, dword ptr fs:[00000030h] | 3_2_02486E2E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02486E2E mov eax, dword ptr fs:[00000030h] | 3_2_02486E2E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02486E2E mov eax, dword ptr fs:[00000030h] | 3_2_02486E2E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02486E2E mov eax, dword ptr fs:[00000030h] | 3_2_02486E2E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02486E2E mov eax, dword ptr fs:[00000030h] | 3_2_02486E2E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02488713 mov eax, dword ptr fs:[00000030h] | 3_2_02488713 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02488713 mov eax, dword ptr fs:[00000030h] | 3_2_02488713 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02488713 mov eax, dword ptr fs:[00000030h] | 3_2_02488713 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02488713 mov eax, dword ptr fs:[00000030h] | 3_2_02488713 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02488713 mov eax, dword ptr fs:[00000030h] | 3_2_02488713 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02488713 mov eax, dword ptr fs:[00000030h] | 3_2_02488713 |