Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A0A030 | 0_2_00A0A030 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_009D607C | 0_2_009D607C |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A06170 | 0_2_00A06170 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_009DC375 | 0_2_009DC375 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A06400 | 0_2_00A06400 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A0C5DA | 0_2_00A0C5DA |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A0E550 | 0_2_00A0E550 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A0F0C0 | 0_2_00A0F0C0 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_009D3183 | 0_2_009D3183 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_009DB100 | 0_2_009DB100 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_009F12E0 | 0_2_009F12E0 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_009CF3F0 | 0_2_009CF3F0 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_009CB990 | 0_2_009CB990 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_009F7B25 | 0_2_009F7B25 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_009EDD70 | 0_2_009EDD70 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_009D1D60 | 0_2_009D1D60 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_009DBFAA | 0_2_009DBFAA |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AD00A9 | 0_2_00AD00A9 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AAC0AD | 0_2_00AAC0AD |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AD208B | 0_2_00AD208B |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AFC087 | 0_2_00AFC087 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A6E094 | 0_2_00A6E094 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AC8094 | 0_2_00AC8094 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A8C0E7 | 0_2_00A8C0E7 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A620FA | 0_2_00A620FA |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AD60C6 | 0_2_00AD60C6 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_009E40E0 | 0_2_009E40E0 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00ADA02E | 0_2_00ADA02E |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A8A020 | 0_2_00A8A020 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A08032 | 0_2_00A08032 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00ABE036 | 0_2_00ABE036 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A64061 | 0_2_00A64061 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A36077 | 0_2_00A36077 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A32078 | 0_2_00A32078 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A5004A | 0_2_00A5004A |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A94058 | 0_2_00A94058 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AB01AC | 0_2_00AB01AC |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AE61A9 | 0_2_00AE61A9 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_009F81B4 | 0_2_009F81B4 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A60197 | 0_2_00A60197 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00ACC19B | 0_2_00ACC19B |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_009CC1A0 | 0_2_009CC1A0 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A70123 | 0_2_00A70123 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A3A12B | 0_2_00A3A12B |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A5613C | 0_2_00A5613C |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A7E160 | 0_2_00A7E160 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AD4161 | 0_2_00AD4161 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A5214D | 0_2_00A5214D |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00ACE2BA | 0_2_00ACE2BA |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00ABA2B3 | 0_2_00ABA2B3 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_009EA2B0 | 0_2_009EA2B0 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AC229E | 0_2_00AC229E |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A342E1 | 0_2_00A342E1 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A9C2F8 | 0_2_00A9C2F8 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00ABC2D7 | 0_2_00ABC2D7 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A922D7 | 0_2_00A922D7 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AF422E | 0_2_00AF422E |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A44232 | 0_2_00A44232 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A5820A | 0_2_00A5820A |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_009D222B | 0_2_009D222B |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_009CA220 | 0_2_009CA220 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AD8211 | 0_2_00AD8211 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00B8626A | 0_2_00B8626A |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A42278 | 0_2_00A42278 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00ACA3A3 | 0_2_00ACA3A3 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A5A393 | 0_2_00A5A393 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A88392 | 0_2_00A88392 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A80397 | 0_2_00A80397 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AC6393 | 0_2_00AC6393 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AA03FC | 0_2_00AA03FC |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00ADA3F4 | 0_2_00ADA3F4 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AB43F0 | 0_2_00AB43F0 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_009E43F0 | 0_2_009E43F0 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_009FA3E0 | 0_2_009FA3E0 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A5C333 | 0_2_00A5C333 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A5433B | 0_2_00A5433B |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00B0031A | 0_2_00B0031A |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A66308 | 0_2_00A66308 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AB6364 | 0_2_00AB6364 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A46375 | 0_2_00A46375 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00ADC34F | 0_2_00ADC34F |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A7A354 | 0_2_00A7A354 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A54485 | 0_2_00A54485 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A7848E | 0_2_00A7848E |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A7448A | 0_2_00A7448A |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_009FE4A9 | 0_2_009FE4A9 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_009CC4D0 | 0_2_009CC4D0 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A524F4 | 0_2_00A524F4 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A364FF | 0_2_00A364FF |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A704FA | 0_2_00A704FA |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_009DE4C2 | 0_2_009DE4C2 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A564C5 | 0_2_00A564C5 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A604D6 | 0_2_00A604D6 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A8C4DF | 0_2_00A8C4DF |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A944D0 | 0_2_00A944D0 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00ADC4D0 | 0_2_00ADC4D0 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A86422 | 0_2_00A86422 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A8E424 | 0_2_00A8E424 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A9E43B | 0_2_00A9E43B |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AA4439 | 0_2_00AA4439 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AE4439 | 0_2_00AE4439 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AF6437 | 0_2_00AF6437 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AEC40D | 0_2_00AEC40D |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00B9041D | 0_2_00B9041D |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AF4406 | 0_2_00AF4406 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A7E41A | 0_2_00A7E41A |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AC446C | 0_2_00AC446C |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AA8462 | 0_2_00AA8462 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AF0466 | 0_2_00AF0466 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A4C471 | 0_2_00A4C471 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A38479 | 0_2_00A38479 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AD0476 | 0_2_00AD0476 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A40443 | 0_2_00A40443 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AE8444 | 0_2_00AE8444 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A34454 | 0_2_00A34454 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00ADE455 | 0_2_00ADE455 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A485AF | 0_2_00A485AF |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00ADA594 | 0_2_00ADA594 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A3259F | 0_2_00A3259F |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A665E4 | 0_2_00A665E4 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A5E5FB | 0_2_00A5E5FB |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A00530 | 0_2_00A00530 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00ABE53E | 0_2_00ABE53E |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A7C53C | 0_2_00A7C53C |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A6250C | 0_2_00A6250C |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A3C51D | 0_2_00A3C51D |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A64573 | 0_2_00A64573 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AB4572 | 0_2_00AB4572 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A82545 | 0_2_00A82545 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_009F6560 | 0_2_009F6560 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A826B4 | 0_2_00A826B4 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AEC68B | 0_2_00AEC68B |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AFA695 | 0_2_00AFA695 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AE6693 | 0_2_00AE6693 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00B006FC | 0_2_00B006FC |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AEA6F9 | 0_2_00AEA6F9 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A706CB | 0_2_00A706CB |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00B886D6 | 0_2_00B886D6 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_009F46F0 | 0_2_009F46F0 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A846D2 | 0_2_00A846D2 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A6E627 | 0_2_00A6E627 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AD8629 | 0_2_00AD8629 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AAE625 | 0_2_00AAE625 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00ACE63C | 0_2_00ACE63C |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AAA601 | 0_2_00AAA601 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A76616 | 0_2_00A76616 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AE4616 | 0_2_00AE4616 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A88616 | 0_2_00A88616 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A8A617 | 0_2_00A8A617 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00ABC643 | 0_2_00ABC643 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A3A655 | 0_2_00A3A655 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_009C2780 | 0_2_009C2780 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A9A784 | 0_2_00A9A784 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A7479F | 0_2_00A7479F |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_009C47A2 | 0_2_009C47A2 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_009E47A0 | 0_2_009E47A0 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AE67FF | 0_2_00AE67FF |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A4A7FE | 0_2_00A4A7FE |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AB67CB | 0_2_00AB67CB |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_009E07F0 | 0_2_009E07F0 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A3E7DB | 0_2_00A3E7DB |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A46734 | 0_2_00A46734 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A9C73F | 0_2_00A9C73F |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AC870E | 0_2_00AC870E |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A5A711 | 0_2_00A5A711 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AFE711 | 0_2_00AFE711 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_009DC74B | 0_2_009DC74B |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AEE779 | 0_2_00AEE779 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AA6740 | 0_2_00AA6740 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AA28A9 | 0_2_00AA28A9 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A9E8AF | 0_2_00A9E8AF |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AE28BD | 0_2_00AE28BD |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AF088D | 0_2_00AF088D |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A4E89C | 0_2_00A4E89C |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A088E3 | 0_2_00A088E3 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A448E3 | 0_2_00A448E3 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AAC8E7 | 0_2_00AAC8E7 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A548FB | 0_2_00A548FB |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A908CD | 0_2_00A908CD |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00ACA8CB | 0_2_00ACA8CB |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00B848D4 | 0_2_00B848D4 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_009F08F0 | 0_2_009F08F0 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A628D5 | 0_2_00A628D5 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A5882F | 0_2_00A5882F |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A2E829 | 0_2_00A2E829 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00ABA820 | 0_2_00ABA820 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AA483B | 0_2_00AA483B |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A8E80F | 0_2_00A8E80F |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AF6805 | 0_2_00AF6805 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AB0819 | 0_2_00AB0819 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A8881C | 0_2_00A8881C |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AD4810 | 0_2_00AD4810 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A00870 | 0_2_00A00870 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A7A872 | 0_2_00A7A872 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AA084B | 0_2_00AA084B |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A92841 | 0_2_00A92841 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AE085F | 0_2_00AE085F |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A7E852 | 0_2_00A7E852 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A8C854 | 0_2_00A8C854 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AC2851 | 0_2_00AC2851 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A0A980 | 0_2_00A0A980 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A9698F | 0_2_00A9698F |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A4A995 | 0_2_00A4A995 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A4C995 | 0_2_00A4C995 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_009CC9A0 | 0_2_009CC9A0 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A049FD | 0_2_00A049FD |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A6C9C4 | 0_2_00A6C9C4 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A349C9 | 0_2_00A349C9 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A669DF | 0_2_00A669DF |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AFE9D6 | 0_2_00AFE9D6 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00ADA920 | 0_2_00ADA920 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A5290A | 0_2_00A5290A |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_009D095E | 0_2_009D095E |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00ADE969 | 0_2_00ADE969 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A9C97F | 0_2_00A9C97F |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A5E97D | 0_2_00A5E97D |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00ADC94F | 0_2_00ADC94F |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AF894B | 0_2_00AF894B |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A36950 | 0_2_00A36950 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A48952 | 0_2_00A48952 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_009CEA9D | 0_2_009CEA9D |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A82ABF | 0_2_00A82ABF |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A68ABA | 0_2_00A68ABA |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A98A9D | 0_2_00A98A9D |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AB8A9D | 0_2_00AB8A9D |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AFAA94 | 0_2_00AFAA94 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AAEAE3 | 0_2_00AAEAE3 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A5CAE8 | 0_2_00A5CAE8 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A72AE8 | 0_2_00A72AE8 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A88ADA | 0_2_00A88ADA |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A86A28 | 0_2_00A86A28 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A76A25 | 0_2_00A76A25 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AD8A3F | 0_2_00AD8A3F |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AC0A30 | 0_2_00AC0A30 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AFCA31 | 0_2_00AFCA31 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A0EA10 | 0_2_00A0EA10 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00ABCA19 | 0_2_00ABCA19 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AA8A1D | 0_2_00AA8A1D |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_009C8A50 | 0_2_009C8A50 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AE4A43 | 0_2_00AE4A43 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00ACEA52 | 0_2_00ACEA52 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A6ABA4 | 0_2_00A6ABA4 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A78BA0 | 0_2_00A78BA0 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AA4BBE | 0_2_00AA4BBE |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A7AB8B | 0_2_00A7AB8B |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_009E4BB0 | 0_2_009E4BB0 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AF4B9A | 0_2_00AF4B9A |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00ADABE8 | 0_2_00ADABE8 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A36BE9 | 0_2_00A36BE9 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A84BC8 | 0_2_00A84BC8 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A26BC9 | 0_2_00A26BC9 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A3CBD2 | 0_2_00A3CBD2 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AD0BD9 | 0_2_00AD0BD9 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AD4BD8 | 0_2_00AD4BD8 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_009E0BE1 | 0_2_009E0BE1 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_009E6B10 | 0_2_009E6B10 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AECB38 | 0_2_00AECB38 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AF2B32 | 0_2_00AF2B32 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AFEB06 | 0_2_00AFEB06 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_009C2B20 | 0_2_009C2B20 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A5EB67 | 0_2_00A5EB67 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A92B7C | 0_2_00A92B7C |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A64B7D | 0_2_00A64B7D |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00ACACAF | 0_2_00ACACAF |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A60CB9 | 0_2_00A60CB9 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A9EC88 | 0_2_00A9EC88 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_009D6CB7 | 0_2_009D6CB7 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A98C82 | 0_2_00A98C82 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A6EC25 | 0_2_00A6EC25 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A4AC33 | 0_2_00A4AC33 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A3AC07 | 0_2_00A3AC07 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00ACCC06 | 0_2_00ACCC06 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AB6C19 | 0_2_00AB6C19 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00B84C0D | 0_2_00B84C0D |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A50C10 | 0_2_00A50C10 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AA2C1D | 0_2_00AA2C1D |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_009CAC20 | 0_2_009CAC20 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A30C1D | 0_2_00A30C1D |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_009F2C58 | 0_2_009F2C58 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A7CC6E | 0_2_00A7CC6E |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_009D0C50 | 0_2_009D0C50 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A4CC77 | 0_2_00A4CC77 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A58C46 | 0_2_00A58C46 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AE0C42 | 0_2_00AE0C42 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00ADEDAF | 0_2_00ADEDAF |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AF0DB0 | 0_2_00AF0DB0 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A5ED8A | 0_2_00A5ED8A |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AC0D9B | 0_2_00AC0D9B |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A6EDE0 | 0_2_00A6EDE0 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_009E4DC0 | 0_2_009E4DC0 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A8EDC8 | 0_2_00A8EDC8 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AE4DCB | 0_2_00AE4DCB |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_009F6DF0 | 0_2_009F6DF0 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A56DD5 | 0_2_00A56DD5 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A86DD0 | 0_2_00A86DD0 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00ABADD3 | 0_2_00ABADD3 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A32D34 | 0_2_00A32D34 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A8CD1E | 0_2_00A8CD1E |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A44D1D | 0_2_00A44D1D |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AE2D62 | 0_2_00AE2D62 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00ABED44 | 0_2_00ABED44 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A0ED50 | 0_2_00A0ED50 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AFAD5E | 0_2_00AFAD5E |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AF8D5D | 0_2_00AF8D5D |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A36EB0 | 0_2_00A36EB0 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AB2E8B | 0_2_00AB2E8B |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A78E94 | 0_2_00A78E94 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A82E9F | 0_2_00A82E9F |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A96E90 | 0_2_00A96E90 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A9CE90 | 0_2_00A9CE90 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00ABCEEB | 0_2_00ABCEEB |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AA0EFB | 0_2_00AA0EFB |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AEAEC6 | 0_2_00AEAEC6 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_009D4EF4 | 0_2_009D4EF4 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AF2ED6 | 0_2_00AF2ED6 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A42EDE | 0_2_00A42EDE |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A34E2A | 0_2_00A34E2A |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A6CE29 | 0_2_00A6CE29 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A92FAC | 0_2_00A92FAC |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A6AFA1 | 0_2_00A6AFA1 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A4EFAD | 0_2_00A4EFAD |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AEEFA4 | 0_2_00AEEFA4 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_009F8F93 | 0_2_009F8F93 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AFCFA2 | 0_2_00AFCFA2 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00ADAFBF | 0_2_00ADAFBF |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_009F8F82 | 0_2_009F8F82 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AC4FE8 | 0_2_00AC4FE8 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A68FF8 | 0_2_00A68FF8 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AB6FC2 | 0_2_00AB6FC2 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AF8F33 | 0_2_00AF8F33 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AD6F08 | 0_2_00AD6F08 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AF6F08 | 0_2_00AF6F08 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A34F18 | 0_2_00A34F18 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A2EF6D | 0_2_00A2EF6D |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_009F8F44 | 0_2_009F8F44 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AC30AF | 0_2_00AC30AF |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AFB0AA | 0_2_00AFB0AA |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AFF0A3 | 0_2_00AFF0A3 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_009E5090 | 0_2_009E5090 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AE50B5 | 0_2_00AE50B5 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A7D088 | 0_2_00A7D088 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AE709E | 0_2_00AE709E |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A070E0 | 0_2_00A070E0 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AC10E1 | 0_2_00AC10E1 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A490F1 | 0_2_00A490F1 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A5D028 | 0_2_00A5D028 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_009F500F | 0_2_009F500F |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A0D038 | 0_2_00A0D038 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00ACF006 | 0_2_00ACF006 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A7B009 | 0_2_00A7B009 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A89018 | 0_2_00A89018 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A3D01B | 0_2_00A3D01B |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AA706B | 0_2_00AA706B |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A8D1B8 | 0_2_00A8D1B8 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A751BC | 0_2_00A751BC |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A9F1B7 | 0_2_00A9F1B7 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AE1184 | 0_2_00AE1184 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AE91DC | 0_2_00AE91DC |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00ADF12A | 0_2_00ADF12A |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00ADB125 | 0_2_00ADB125 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A7712E | 0_2_00A7712E |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A5112F | 0_2_00A5112F |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A8510E | 0_2_00A8510E |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A99101 | 0_2_00A99101 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A6710F | 0_2_00A6710F |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AB7117 | 0_2_00AB7117 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AB5165 | 0_2_00AB5165 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AF1170 | 0_2_00AF1170 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AE314E | 0_2_00AE314E |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A3914C | 0_2_00A3914C |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AB115A | 0_2_00AB115A |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_009DF169 | 0_2_009DF169 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A4315F | 0_2_00A4315F |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_009E1160 | 0_2_009E1160 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A792A5 | 0_2_00A792A5 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AD12AE | 0_2_00AD12AE |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AFD2A1 | 0_2_00AFD2A1 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A952BB | 0_2_00A952BB |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A452E9 | 0_2_00A452E9 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AE72FC | 0_2_00AE72FC |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AEF2F3 | 0_2_00AEF2F3 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00B45238 | 0_2_00B45238 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00ADD239 | 0_2_00ADD239 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A5520E | 0_2_00A5520E |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AA3212 | 0_2_00AA3212 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A71265 | 0_2_00A71265 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00ADF26F | 0_2_00ADF26F |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A6B262 | 0_2_00A6B262 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A9D261 | 0_2_00A9D261 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A4D268 | 0_2_00A4D268 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A7F268 | 0_2_00A7F268 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A6927D | 0_2_00A6927D |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00B81258 | 0_2_00B81258 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_009DC74B | 0_2_009DC74B |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A5725B | 0_2_00A5725B |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A2F3A3 | 0_2_00A2F3A3 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A3B3A7 | 0_2_00A3B3A7 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AB93AE | 0_2_00AB93AE |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A7B3B6 | 0_2_00A7B3B6 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_009E3382 | 0_2_009E3382 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A653BA | 0_2_00A653BA |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A3F382 | 0_2_00A3F382 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A5F384 | 0_2_00A5F384 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AD738F | 0_2_00AD738F |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AD5381 | 0_2_00AD5381 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A93387 | 0_2_00A93387 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_009F73DF | 0_2_009F73DF |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_009FF3DA | 0_2_009FF3DA |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A7D3EC | 0_2_00A7D3EC |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_009ED3C7 | 0_2_009ED3C7 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A4F3DD | 0_2_00A4F3DD |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AFB32B | 0_2_00AFB32B |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A8732D | 0_2_00A8732D |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A7333B | 0_2_00A7333B |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AF7330 | 0_2_00AF7330 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A5B300 | 0_2_00A5B300 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AA131C | 0_2_00AA131C |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A89314 | 0_2_00A89314 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_009FD348 | 0_2_009FD348 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_009F3343 | 0_2_009F3343 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AF135C | 0_2_00AF135C |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_009DD361 | 0_2_009DD361 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A3735F | 0_2_00A3735F |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A47359 | 0_2_00A47359 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AC14A8 | 0_2_00AC14A8 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AAF48A | 0_2_00AAF48A |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A61484 | 0_2_00A61484 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00ABF489 | 0_2_00ABF489 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00ACD485 | 0_2_00ACD485 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A5D49C | 0_2_00A5D49C |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AED4FA | 0_2_00AED4FA |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A494C6 | 0_2_00A494C6 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00B954CC | 0_2_00B954CC |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A43427 | 0_2_00A43427 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_009CB410 | 0_2_009CB410 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AF9423 | 0_2_00AF9423 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A8341A | 0_2_00A8341A |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AAB460 | 0_2_00AAB460 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A8547A | 0_2_00A8547A |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_009C9440 | 0_2_009C9440 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A89474 | 0_2_00A89474 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AC544C | 0_2_00AC544C |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A9744F | 0_2_00A9744F |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00B8B450 | 0_2_00B8B450 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A07450 | 0_2_00A07450 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A59454 | 0_2_00A59454 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A69452 | 0_2_00A69452 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A6F451 | 0_2_00A6F451 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A7D5A6 | 0_2_00A7D5A6 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AA55AD | 0_2_00AA55AD |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A7F5B5 | 0_2_00A7F5B5 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AB758E | 0_2_00AB758E |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00ABD592 | 0_2_00ABD592 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00B7F589 | 0_2_00B7F589 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AD95EF | 0_2_00AD95EF |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_009D75D3 | 0_2_009D75D3 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AE15FB | 0_2_00AE15FB |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AC95DD | 0_2_00AC95DD |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A715D9 | 0_2_00A715D9 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A9952D | 0_2_00A9952D |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AF7502 | 0_2_00AF7502 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A65513 | 0_2_00A65513 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_009C3520 | 0_2_009C3520 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A7956F | 0_2_00A7956F |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AA954A | 0_2_00AA954A |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00ADF54C | 0_2_00ADF54C |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A4F555 | 0_2_00A4F555 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A81553 | 0_2_00A81553 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AB56A5 | 0_2_00AB56A5 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A8F6B8 | 0_2_00A8F6B8 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AD36B7 | 0_2_00AD36B7 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A73683 | 0_2_00A73683 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A37692 | 0_2_00A37692 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A39698 | 0_2_00A39698 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A7B6EC | 0_2_00A7B6EC |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A4B6D0 | 0_2_00A4B6D0 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A51621 | 0_2_00A51621 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A57622 | 0_2_00A57622 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AC5620 | 0_2_00AC5620 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A35630 | 0_2_00A35630 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A5360E | 0_2_00A5360E |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00ABB61C | 0_2_00ABB61C |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A63660 | 0_2_00A63660 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AA366C | 0_2_00AA366C |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A33677 | 0_2_00A33677 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AF3656 | 0_2_00AF3656 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A057A0 | 0_2_00A057A0 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AB17A6 | 0_2_00AB17A6 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AED7B3 | 0_2_00AED7B3 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AA579B | 0_2_00AA579B |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AFB79A | 0_2_00AFB79A |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A5979D | 0_2_00A5979D |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A3579A | 0_2_00A3579A |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00ADD7E9 | 0_2_00ADD7E9 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A477F5 | 0_2_00A477F5 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A457D0 | 0_2_00A457D0 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A537D8 | 0_2_00A537D8 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00ACF72C | 0_2_00ACF72C |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00AD1724 | 0_2_00AD1724 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | Code function: 0_2_00A95735 | 0_2_00A95735 |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: A26BF6 second address: A26BFA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: B9B9AE second address: B9B9BE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC064DA37BCh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: B9B9BE second address: B9B9EA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC064DD4F88h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jp 00007FC064DD4F7Ah 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: B9B9EA second address: B9B9F9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC064DA37BBh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: B9B9F9 second address: B9B9FD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: B9B9FD second address: B9BA0E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 jl 00007FC064DA37B8h 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: B9E304 second address: B9E333 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 nop 0x00000009 mov cx, bx 0x0000000c push 00000000h 0x0000000e jg 00007FC064DD4F7Ch 0x00000014 call 00007FC064DD4F79h 0x00000019 pushad 0x0000001a jno 00007FC064DD4F78h 0x00000020 push ecx 0x00000021 push eax 0x00000022 push edx 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: B9E333 second address: B9E33F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 popad 0x00000006 push eax 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a push ebx 0x0000000b pop ebx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: B9E33F second address: B9E37D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FC064DD4F7Fh 0x0000000b popad 0x0000000c mov eax, dword ptr [esp+04h] 0x00000010 push edx 0x00000011 pushad 0x00000012 jns 00007FC064DD4F76h 0x00000018 jg 00007FC064DD4F76h 0x0000001e popad 0x0000001f pop edx 0x00000020 mov eax, dword ptr [eax] 0x00000022 push eax 0x00000023 push edx 0x00000024 jmp 00007FC064DD4F80h 0x00000029 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: B9E37D second address: B9E393 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FC064DA37C2h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: B9E393 second address: B9E3B8 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FC064DD4F76h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov dword ptr [esp+04h], eax 0x00000010 pushad 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007FC064DD4F82h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: B9E3B8 second address: B9E478 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007FC064DA37BBh 0x0000000c pushad 0x0000000d popad 0x0000000e popad 0x0000000f popad 0x00000010 pop eax 0x00000011 jnc 00007FC064DA37CCh 0x00000017 mov dword ptr [ebp+122D238Fh], esi 0x0000001d push 00000003h 0x0000001f push 00000000h 0x00000021 push ebp 0x00000022 call 00007FC064DA37B8h 0x00000027 pop ebp 0x00000028 mov dword ptr [esp+04h], ebp 0x0000002c add dword ptr [esp+04h], 00000018h 0x00000034 inc ebp 0x00000035 push ebp 0x00000036 ret 0x00000037 pop ebp 0x00000038 ret 0x00000039 mov edx, dword ptr [ebp+122D37F1h] 0x0000003f push 00000000h 0x00000041 mov edi, dword ptr [ebp+122D39FDh] 0x00000047 mov edx, dword ptr [ebp+122D1D27h] 0x0000004d push 00000003h 0x0000004f sub dword ptr [ebp+122D2FB0h], ecx 0x00000055 call 00007FC064DA37B9h 0x0000005a jmp 00007FC064DA37C5h 0x0000005f push eax 0x00000060 jnl 00007FC064DA37D1h 0x00000066 pushad 0x00000067 jmp 00007FC064DA37C7h 0x0000006c push ebx 0x0000006d pop ebx 0x0000006e popad 0x0000006f mov eax, dword ptr [esp+04h] 0x00000073 pushad 0x00000074 push eax 0x00000075 push edx 0x00000076 push edx 0x00000077 pop edx 0x00000078 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: B9E478 second address: B9E4DF instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ebx 0x00000007 jg 00007FC064DD4F76h 0x0000000d pop ebx 0x0000000e popad 0x0000000f mov eax, dword ptr [eax] 0x00000011 jmp 00007FC064DD4F7Eh 0x00000016 mov dword ptr [esp+04h], eax 0x0000001a jmp 00007FC064DD4F7Bh 0x0000001f pop eax 0x00000020 push 00000000h 0x00000022 push esi 0x00000023 call 00007FC064DD4F78h 0x00000028 pop esi 0x00000029 mov dword ptr [esp+04h], esi 0x0000002d add dword ptr [esp+04h], 00000018h 0x00000035 inc esi 0x00000036 push esi 0x00000037 ret 0x00000038 pop esi 0x00000039 ret 0x0000003a lea ebx, dword ptr [ebp+1244B1D3h] 0x00000040 mov dx, di 0x00000043 push eax 0x00000044 mov edi, dword ptr [ebp+122D3AFDh] 0x0000004a pop ecx 0x0000004b push eax 0x0000004c push eax 0x0000004d push edx 0x0000004e push eax 0x0000004f push edx 0x00000050 push eax 0x00000051 push edx 0x00000052 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: B9E4DF second address: B9E4E3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: B9E4E3 second address: B9E4E7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: B9E4E7 second address: B9E4ED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: B9E4ED second address: B9E4F2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: B9E55B second address: B9E59C instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edi 0x00000007 nop 0x00000008 mov edi, 10D5CA12h 0x0000000d push 00000000h 0x0000000f pushad 0x00000010 mov ecx, dword ptr [ebp+122D386Dh] 0x00000016 call 00007FC064DA37C5h 0x0000001b mov ebx, dword ptr [ebp+122D37B5h] 0x00000021 pop ebx 0x00000022 popad 0x00000023 call 00007FC064DA37B9h 0x00000028 pushad 0x00000029 push eax 0x0000002a push edx 0x0000002b push ebx 0x0000002c pop ebx 0x0000002d rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: B9E59C second address: B9E5A6 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: B9E5A6 second address: B9E5B8 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FC064DA37B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b push eax 0x0000000c pushad 0x0000000d pushad 0x0000000e pushad 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: B9E5B8 second address: B9E5E0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007FC064DD4F84h 0x0000000a popad 0x0000000b mov eax, dword ptr [esp+04h] 0x0000000f push eax 0x00000010 push edx 0x00000011 jl 00007FC064DD4F78h 0x00000017 pushad 0x00000018 popad 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: B9E5E0 second address: B9E5FA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FC064DA37C6h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: B9E5FA second address: B9E61F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr [eax] 0x0000000a jl 00007FC064DD4F7Eh 0x00000010 ja 00007FC064DD4F78h 0x00000016 mov dword ptr [esp+04h], eax 0x0000001a push eax 0x0000001b push eax 0x0000001c push edx 0x0000001d jbe 00007FC064DD4F76h 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: B9E61F second address: B9E673 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop eax 0x00000007 pop eax 0x00000008 sub dword ptr [ebp+122D1D09h], ebx 0x0000000e push 00000003h 0x00000010 mov dword ptr [ebp+122D1D62h], ebx 0x00000016 sub dword ptr [ebp+122D1CDFh], edx 0x0000001c push 00000000h 0x0000001e mov esi, 6B68365Bh 0x00000023 push 00000003h 0x00000025 jmp 00007FC064DA37C1h 0x0000002a call 00007FC064DA37B9h 0x0000002f push edx 0x00000030 pushad 0x00000031 jmp 00007FC064DA37C1h 0x00000036 push eax 0x00000037 push edx 0x00000038 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: B9E673 second address: B9E6BA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 push eax 0x00000007 jmp 00007FC064DD4F83h 0x0000000c mov eax, dword ptr [esp+04h] 0x00000010 jmp 00007FC064DD4F87h 0x00000015 mov eax, dword ptr [eax] 0x00000017 push eax 0x00000018 push edx 0x00000019 jmp 00007FC064DD4F7Eh 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: B9E6BA second address: B9E6DD instructions: 0x00000000 rdtsc 0x00000002 jno 00007FC064DA37B8h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dword ptr [esp+04h], eax 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007FC064DA37BFh 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: B9E6DD second address: B9E6E1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: B9E6E1 second address: B9E6E7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: B9E6E7 second address: B9E6F1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jp 00007FC064DD4F76h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: B9E803 second address: B9E8AC instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 add dword ptr [esp], 44D2CE66h 0x0000000e jnc 00007FC064DA37BBh 0x00000014 mov ecx, 31249782h 0x00000019 push 00000003h 0x0000001b jns 00007FC064DA37BAh 0x00000021 push 00000000h 0x00000023 push ecx 0x00000024 pushad 0x00000025 mov cx, si 0x00000028 jmp 00007FC064DA37C9h 0x0000002d popad 0x0000002e pop edi 0x0000002f xor esi, dword ptr [ebp+122D37F1h] 0x00000035 push 00000003h 0x00000037 jne 00007FC064DA37BCh 0x0000003d push 76A10C8Ah 0x00000042 jmp 00007FC064DA37C4h 0x00000047 add dword ptr [esp], 495EF376h 0x0000004e push edx 0x0000004f mov dword ptr [ebp+122D2465h], esi 0x00000055 pop edi 0x00000056 lea ebx, dword ptr [ebp+1244B1E7h] 0x0000005c je 00007FC064DA37C5h 0x00000062 jmp 00007FC064DA37BFh 0x00000067 xchg eax, ebx 0x00000068 push eax 0x00000069 push edx 0x0000006a jng 00007FC064DA37BCh 0x00000070 push eax 0x00000071 push edx 0x00000072 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: B9E8AC second address: B9E8B0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: B9E8B0 second address: B9E8B5 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: B8AF71 second address: B8AFA2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jbe 00007FC064DD4F76h 0x0000000a pop esi 0x0000000b jmp 00007FC064DD4F88h 0x00000010 push eax 0x00000011 push ebx 0x00000012 pop ebx 0x00000013 jbe 00007FC064DD4F76h 0x00000019 pop eax 0x0000001a push eax 0x0000001b push edx 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: B8AFA2 second address: B8AFA8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BBEAC2 second address: BBEAF7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop esi 0x00000007 jmp 00007FC064DD4F84h 0x0000000c pushad 0x0000000d jmp 00007FC064DD4F7Bh 0x00000012 jc 00007FC064DD4F76h 0x00000018 push ecx 0x00000019 pop ecx 0x0000001a push ebx 0x0000001b pop ebx 0x0000001c popad 0x0000001d push esi 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BBF061 second address: BBF067 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BBF067 second address: BBF07C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnp 00007FC064DD4F76h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d jg 00007FC064DD4F76h 0x00000013 pushad 0x00000014 popad 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BBF1D2 second address: BBF1EC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FC064DA37C6h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BBF1EC second address: BBF212 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC064DD4F7Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FC064DD4F84h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BBF4E2 second address: BBF507 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC064DA37C3h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b js 00007FC064DA37BCh 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BBF507 second address: BBF523 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jnp 00007FC064DD4F76h 0x00000009 push esi 0x0000000a pop esi 0x0000000b jmp 00007FC064DD4F7Fh 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BBF6C6 second address: BBF6D8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC064DA37BAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BBF6D8 second address: BBF6E2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007FC064DD4F76h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BBF84A second address: BBF861 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push edi 0x00000006 push ecx 0x00000007 pop ecx 0x00000008 jmp 00007FC064DA37BAh 0x0000000d pop edi 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BBF861 second address: BBF867 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BBF9CB second address: BBF9F2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pushad 0x00000007 popad 0x00000008 pushad 0x00000009 popad 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d push ecx 0x0000000e pop ecx 0x0000000f jmp 00007FC064DA37C8h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BBF9F2 second address: BBF9F6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BBFDD8 second address: BBFDDE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BC41F3 second address: BC4205 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FC064DD4F7Eh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BC4205 second address: BC4222 instructions: 0x00000000 rdtsc 0x00000002 jng 00007FC064DA37B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 jc 00007FC064DA37B6h 0x00000016 jp 00007FC064DA37B6h 0x0000001c popad 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BCAE56 second address: BCAE5A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BCAE5A second address: BCAE63 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BCAFF4 second address: BCB015 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 popad 0x00000006 pushad 0x00000007 jmp 00007FC064DD4F87h 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BCB015 second address: BCB020 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BCB020 second address: BCB024 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: B94FC2 second address: B94FC9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: B94FC9 second address: B94FE9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FC064DD4F85h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: B94FE9 second address: B94FED instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: B94FED second address: B95027 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jp 00007FC064DD4F76h 0x0000000d jmp 00007FC064DD4F85h 0x00000012 jmp 00007FC064DD4F87h 0x00000017 popad 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: B95027 second address: B9502E instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BCE4A3 second address: BCE522 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FC064DD4F7Eh 0x00000008 jns 00007FC064DD4F76h 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 xor dword ptr [esp], 2FD55F69h 0x00000018 push 00000000h 0x0000001a push ecx 0x0000001b call 00007FC064DD4F78h 0x00000020 pop ecx 0x00000021 mov dword ptr [esp+04h], ecx 0x00000025 add dword ptr [esp+04h], 0000001Ch 0x0000002d inc ecx 0x0000002e push ecx 0x0000002f ret 0x00000030 pop ecx 0x00000031 ret 0x00000032 call 00007FC064DD4F79h 0x00000037 pushad 0x00000038 jmp 00007FC064DD4F80h 0x0000003d push edx 0x0000003e push eax 0x0000003f pop eax 0x00000040 pop edx 0x00000041 popad 0x00000042 push eax 0x00000043 jbe 00007FC064DD4F7Ch 0x00000049 pushad 0x0000004a push ebx 0x0000004b pop ebx 0x0000004c push ebx 0x0000004d pop ebx 0x0000004e popad 0x0000004f mov eax, dword ptr [esp+04h] 0x00000053 pushad 0x00000054 pushad 0x00000055 jc 00007FC064DD4F76h 0x0000005b push eax 0x0000005c push edx 0x0000005d rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BCE522 second address: BCE540 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jnc 00007FC064DA37B8h 0x0000000b popad 0x0000000c mov eax, dword ptr [eax] 0x0000000e push eax 0x0000000f push edx 0x00000010 jnl 00007FC064DA37BCh 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BCE540 second address: BCE573 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC064DD4F82h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp+04h], eax 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007FC064DD4F87h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BCEA12 second address: BCEA16 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BCF0BE second address: BCF0C2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BCF0C2 second address: BCF0D0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 pushad 0x00000009 pushad 0x0000000a push ebx 0x0000000b pop ebx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BCF0D0 second address: BCF0D9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BCF0D9 second address: BCF0DD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BCF1B1 second address: BCF1C1 instructions: 0x00000000 rdtsc 0x00000002 jne 00007FC064DD4F76h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push esi 0x0000000c push eax 0x0000000d push edx 0x0000000e push edi 0x0000000f pop edi 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BCF352 second address: BCF357 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BCF357 second address: BCF35D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BCF35D second address: BCF381 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC064DA37C7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BCF381 second address: BCF399 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC064DD4F84h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BCF5B7 second address: BCF5C2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007FC064DA37B6h 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BCF76C second address: BCF770 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BCFD35 second address: BCFD4A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC064DA37C1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BD1516 second address: BD1532 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jne 00007FC064DD4F76h 0x00000009 jo 00007FC064DD4F76h 0x0000000f popad 0x00000010 pop edx 0x00000011 pop eax 0x00000012 push eax 0x00000013 push ecx 0x00000014 push eax 0x00000015 push edx 0x00000016 jng 00007FC064DD4F76h 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BD1F95 second address: BD1F9B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BD3B1D second address: BD3B59 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 jnc 00007FC064DD4F76h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c ja 00007FC064DD4F8Dh 0x00000012 pushad 0x00000013 jmp 00007FC064DD4F7Eh 0x00000018 push eax 0x00000019 push edx 0x0000001a pushad 0x0000001b popad 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BD3B59 second address: BD3B5D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BD3B5D second address: BD3B7C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FC064DD4F81h 0x0000000d jnp 00007FC064DD4F76h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BD55A0 second address: BD55AF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 jbe 00007FC064DA37C0h 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BD6168 second address: BD616D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BD637E second address: BD6384 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BD616D second address: BD6173 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BD6384 second address: BD6389 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BDB203 second address: BDB209 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BDA328 second address: BDA32E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BDC1E2 second address: BDC203 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007FC064DD4F84h 0x0000000a popad 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 pop eax 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BDB424 second address: BDB428 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BDC203 second address: BDC209 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BDB428 second address: BDB42C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BDC209 second address: BDC20E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BDD216 second address: BDD21B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BDC39A second address: BDC3A1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BDE207 second address: BDE21C instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FC064DA37BDh 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BDE537 second address: BDE53C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BE25AF second address: BE25BE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pushad 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a pushad 0x0000000b popad 0x0000000c push edi 0x0000000d pop edi 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BE06D6 second address: BE06E8 instructions: 0x00000000 rdtsc 0x00000002 je 00007FC064DD4F76h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c je 00007FC064DD4F76h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BE25BE second address: BE25CC instructions: 0x00000000 rdtsc 0x00000002 jp 00007FC064DA37B8h 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a push eax 0x0000000b push edx 0x0000000c push ebx 0x0000000d pop ebx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BE06E8 second address: BE0768 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov dword ptr [esp], eax 0x0000000a push 00000000h 0x0000000c push esi 0x0000000d call 00007FC064DD4F78h 0x00000012 pop esi 0x00000013 mov dword ptr [esp+04h], esi 0x00000017 add dword ptr [esp+04h], 0000001Ah 0x0000001f inc esi 0x00000020 push esi 0x00000021 ret 0x00000022 pop esi 0x00000023 ret 0x00000024 push dword ptr fs:[00000000h] 0x0000002b mov dword ptr fs:[00000000h], esp 0x00000032 mov eax, dword ptr [ebp+122D1699h] 0x00000038 call 00007FC064DD4F82h 0x0000003d mov edi, dword ptr [ebp+122D3A5Dh] 0x00000043 pop edi 0x00000044 push FFFFFFFFh 0x00000046 mov edi, dword ptr [ebp+122D3A8Dh] 0x0000004c nop 0x0000004d jmp 00007FC064DD4F84h 0x00000052 push eax 0x00000053 pushad 0x00000054 push edi 0x00000055 pushad 0x00000056 popad 0x00000057 pop edi 0x00000058 push eax 0x00000059 push edx 0x0000005a push eax 0x0000005b push edx 0x0000005c rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BE0768 second address: BE076C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: B96A6D second address: B96A72 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: B96A72 second address: B96A86 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pushad 0x00000006 jnl 00007FC064DA37B6h 0x0000000c jnp 00007FC064DA37B6h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: B96A86 second address: B96A8C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BE2AFB second address: BE2B13 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC064DA37C4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BE2B13 second address: BE2B2C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jns 00007FC064DD4F76h 0x00000009 push esi 0x0000000a pop esi 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push eax 0x00000010 pushad 0x00000011 je 00007FC064DD4F76h 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BE3B8F second address: BE3B96 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BE3B96 second address: BE3C18 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FC064DD4F88h 0x00000008 pushad 0x00000009 popad 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d nop 0x0000000e add dword ptr [ebp+122D23A8h], eax 0x00000014 push 00000000h 0x00000016 push 00000000h 0x00000018 push edi 0x00000019 call 00007FC064DD4F78h 0x0000001e pop edi 0x0000001f mov dword ptr [esp+04h], edi 0x00000023 add dword ptr [esp+04h], 00000017h 0x0000002b inc edi 0x0000002c push edi 0x0000002d ret 0x0000002e pop edi 0x0000002f ret 0x00000030 sub dword ptr [ebp+1244594Fh], esi 0x00000036 push 00000000h 0x00000038 push 00000000h 0x0000003a push ebp 0x0000003b call 00007FC064DD4F78h 0x00000040 pop ebp 0x00000041 mov dword ptr [esp+04h], ebp 0x00000045 add dword ptr [esp+04h], 0000001Ah 0x0000004d inc ebp 0x0000004e push ebp 0x0000004f ret 0x00000050 pop ebp 0x00000051 ret 0x00000052 xor dword ptr [ebp+122D2E5Fh], edx 0x00000058 xchg eax, esi 0x00000059 push ebx 0x0000005a push eax 0x0000005b push edx 0x0000005c jne 00007FC064DD4F76h 0x00000062 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BE4B26 second address: BE4B30 instructions: 0x00000000 rdtsc 0x00000002 je 00007FC064DA37BCh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BE6B54 second address: BE6B59 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BE6B59 second address: BE6B70 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FC064DA37C3h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BE6B70 second address: BE6C05 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC064DD4F84h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov dword ptr [esp], eax 0x0000000e push 00000000h 0x00000010 push ecx 0x00000011 call 00007FC064DD4F78h 0x00000016 pop ecx 0x00000017 mov dword ptr [esp+04h], ecx 0x0000001b add dword ptr [esp+04h], 00000014h 0x00000023 inc ecx 0x00000024 push ecx 0x00000025 ret 0x00000026 pop ecx 0x00000027 ret 0x00000028 push 00000000h 0x0000002a mov ebx, dword ptr [ebp+122D3AD5h] 0x00000030 adc bh, FFFFFFD7h 0x00000033 push 00000000h 0x00000035 push 00000000h 0x00000037 push esi 0x00000038 call 00007FC064DD4F78h 0x0000003d pop esi 0x0000003e mov dword ptr [esp+04h], esi 0x00000042 add dword ptr [esp+04h], 0000001Dh 0x0000004a inc esi 0x0000004b push esi 0x0000004c ret 0x0000004d pop esi 0x0000004e ret 0x0000004f jg 00007FC064DD4F7Bh 0x00000055 jmp 00007FC064DD4F88h 0x0000005a push eax 0x0000005b push eax 0x0000005c push edx 0x0000005d push ecx 0x0000005e push ebx 0x0000005f pop ebx 0x00000060 pop ecx 0x00000061 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BE4CEE second address: BE4CF5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BE7A2C second address: BE7A31 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BE7A31 second address: BE7A48 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FC064DA37C3h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BE6D83 second address: BE6D93 instructions: 0x00000000 rdtsc 0x00000002 ja 00007FC064DD4F76h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BE6D93 second address: BE6DAF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC064DA37C7h 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BE6DAF second address: BE6DBA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jnp 00007FC064DD4F76h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BE6DBA second address: BE6E4B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 nop 0x00000008 mov bx, 2500h 0x0000000c push dword ptr fs:[00000000h] 0x00000013 push 00000000h 0x00000015 push ecx 0x00000016 call 00007FC064DA37B8h 0x0000001b pop ecx 0x0000001c mov dword ptr [esp+04h], ecx 0x00000020 add dword ptr [esp+04h], 00000017h 0x00000028 inc ecx 0x00000029 push ecx 0x0000002a ret 0x0000002b pop ecx 0x0000002c ret 0x0000002d or ebx, 1C856A04h 0x00000033 mov dword ptr fs:[00000000h], esp 0x0000003a sub dword ptr [ebp+122D2E5Bh], edx 0x00000040 mov dword ptr [ebp+122D372Eh], esi 0x00000046 mov eax, dword ptr [ebp+122D05B1h] 0x0000004c sub bx, AE9Dh 0x00000051 mov bh, B8h 0x00000053 push FFFFFFFFh 0x00000055 push 00000000h 0x00000057 push ecx 0x00000058 call 00007FC064DA37B8h 0x0000005d pop ecx 0x0000005e mov dword ptr [esp+04h], ecx 0x00000062 add dword ptr [esp+04h], 00000018h 0x0000006a inc ecx 0x0000006b push ecx 0x0000006c ret 0x0000006d pop ecx 0x0000006e ret 0x0000006f or dword ptr [ebp+124531E5h], edx 0x00000075 push eax 0x00000076 push eax 0x00000077 push edx 0x00000078 pushad 0x00000079 jns 00007FC064DA37B6h 0x0000007f jnc 00007FC064DA37B6h 0x00000085 popad 0x00000086 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BE7D3F second address: BE7D43 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BE7D43 second address: BE7D47 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BE8E21 second address: BE8E3D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007FC064DD4F82h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BE8F37 second address: BE8F3B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BEB020 second address: BEB024 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BEB024 second address: BEB028 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: B919B0 second address: B919B6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: B919B6 second address: B919C4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c push ebx 0x0000000d pop ebx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BF3C48 second address: BF3C4C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BF3C4C second address: BF3C63 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 pushad 0x00000008 jmp 00007FC064DA37BCh 0x0000000d push eax 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BFAC92 second address: BFAC96 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BFAD4B second address: BFAD58 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push edi 0x00000004 pop edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a push esi 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BFAD58 second address: BFAD7A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 jno 00007FC064DD4F84h 0x0000000b popad 0x0000000c mov eax, dword ptr [esp+04h] 0x00000010 pushad 0x00000011 pushad 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BFAE1E second address: BFAE24 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BFAE24 second address: BFAE35 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FC064DD4F7Dh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BFAE35 second address: BFAE39 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BFCCE6 second address: BFCD03 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 jmp 00007FC064DD4F84h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C02EC2 second address: C02EF7 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 jmp 00007FC064DA37C9h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jmp 00007FC064DA37C6h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C02191 second address: C0219C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push esi 0x00000004 pop esi 0x00000005 pushad 0x00000006 popad 0x00000007 push eax 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C023FE second address: C02402 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C02402 second address: C02420 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jns 00007FC064DD4F82h 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C026F6 second address: C02710 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pushad 0x00000004 popad 0x00000005 jg 00007FC064DA37B6h 0x0000000b pop esi 0x0000000c pushad 0x0000000d push edi 0x0000000e pop edi 0x0000000f push ecx 0x00000010 pop ecx 0x00000011 push ecx 0x00000012 pop ecx 0x00000013 popad 0x00000014 pop edx 0x00000015 pop eax 0x00000016 pushad 0x00000017 pushad 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C02710 second address: C02739 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 popad 0x00000007 push ebx 0x00000008 pushad 0x00000009 popad 0x0000000a pushad 0x0000000b popad 0x0000000c pop ebx 0x0000000d jmp 00007FC064DD4F88h 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C02739 second address: C0273D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C02CAB second address: C02D01 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC064DD4F7Bh 0x00000009 pop eax 0x0000000a push ebx 0x0000000b pushad 0x0000000c popad 0x0000000d push edi 0x0000000e pop edi 0x0000000f pop ebx 0x00000010 jmp 00007FC064DD4F82h 0x00000015 popad 0x00000016 push eax 0x00000017 push edx 0x00000018 push ecx 0x00000019 jbe 00007FC064DD4F76h 0x0000001f jmp 00007FC064DD4F7Fh 0x00000024 pop ecx 0x00000025 push eax 0x00000026 push edx 0x00000027 jmp 00007FC064DD4F80h 0x0000002c pushad 0x0000002d popad 0x0000002e rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C02D01 second address: C02D1D instructions: 0x00000000 rdtsc 0x00000002 jnl 00007FC064DA37B6h 0x00000008 jmp 00007FC064DA37C2h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: B8FEB0 second address: B8FED8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 jl 00007FC064DD4F78h 0x0000000b pushad 0x0000000c popad 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 jnc 00007FC064DD4F88h 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: B8FED8 second address: B8FEDE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C0C551 second address: C0C55D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jbe 00007FC064DD4F76h 0x0000000a push edi 0x0000000b pop edi 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C0C6E3 second address: C0C6EA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C0CA1E second address: C0CA2B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 js 00007FC064DD4F89h 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C0D3E0 second address: C0D3E5 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C11BE0 second address: C11BE6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C11BE6 second address: C11BEA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C11BEA second address: C11C14 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC064DD4F81h 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FC064DD4F7Fh 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C11C14 second address: C11C18 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C11C18 second address: C11C22 instructions: 0x00000000 rdtsc 0x00000002 jne 00007FC064DD4F76h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C11E9F second address: C11EA5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C11EA5 second address: C11EBC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jng 00007FC064DD4F82h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C11EBC second address: C11EE4 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 jmp 00007FC064DA37BEh 0x00000008 push eax 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push edx 0x0000000f push ecx 0x00000010 jbe 00007FC064DA37B6h 0x00000016 pop ecx 0x00000017 push eax 0x00000018 push edx 0x00000019 jbe 00007FC064DA37B6h 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C11EE4 second address: C11EEA instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C12337 second address: C12384 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pushad 0x00000007 jmp 00007FC064DA37C1h 0x0000000c jmp 00007FC064DA37BAh 0x00000011 jo 00007FC064DA37B6h 0x00000017 popad 0x00000018 jns 00007FC064DA37CCh 0x0000001e popad 0x0000001f pushad 0x00000020 push eax 0x00000021 push edx 0x00000022 push edi 0x00000023 pop edi 0x00000024 push edi 0x00000025 pop edi 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C12384 second address: C1238E instructions: 0x00000000 rdtsc 0x00000002 js 00007FC064DD4F76h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C12966 second address: C1296E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 push ecx 0x00000007 pop ecx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C1296E second address: C12972 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BB57E0 second address: BB5811 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pushad 0x00000006 jmp 00007FC064DA37BCh 0x0000000b push ecx 0x0000000c pop ecx 0x0000000d jmp 00007FC064DA37C5h 0x00000012 popad 0x00000013 popad 0x00000014 push ecx 0x00000015 pushad 0x00000016 push esi 0x00000017 pop esi 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BB5811 second address: BB581B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push ecx 0x00000007 pop ecx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: B8C9DC second address: B8C9E0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C130AB second address: C130B1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C130B1 second address: C130B7 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C130B7 second address: C130D5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ebx 0x00000007 pushad 0x00000008 jne 00007FC064DD4F7Ch 0x0000000e jo 00007FC064DD4F76h 0x00000014 push eax 0x00000015 push edx 0x00000016 jc 00007FC064DD4F76h 0x0000001c push esi 0x0000001d pop esi 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C130D5 second address: C130F2 instructions: 0x00000000 rdtsc 0x00000002 jng 00007FC064DA37B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push edi 0x0000000d pop edi 0x0000000e jmp 00007FC064DA37BFh 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C16D0E second address: C16D20 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 jmp 00007FC064DD4F7Dh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C16D20 second address: C16D29 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C16D29 second address: C16D2D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C16D2D second address: C16D33 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C16D33 second address: C16D4C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push ebx 0x0000000c pop ebx 0x0000000d jmp 00007FC064DD4F7Ch 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BD759E second address: BD75A3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BD75A3 second address: BD75BD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push esi 0x00000004 pop esi 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FC064DD4F7Fh 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BD76BE second address: BD76D4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC064DA37C2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BD76D4 second address: BD76DA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BD78C5 second address: BD78CC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BD7ABA second address: BD7ABE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BD7ABE second address: BD7ACC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jbe 00007FC064DA37B6h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BD7BFC second address: BD7C03 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BD7C96 second address: BD7C9A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BD7C9A second address: BD7CD3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 xchg eax, esi 0x00000007 push 00000000h 0x00000009 push esi 0x0000000a call 00007FC064DD4F78h 0x0000000f pop esi 0x00000010 mov dword ptr [esp+04h], esi 0x00000014 add dword ptr [esp+04h], 00000016h 0x0000001c inc esi 0x0000001d push esi 0x0000001e ret 0x0000001f pop esi 0x00000020 ret 0x00000021 mov di, dx 0x00000024 nop 0x00000025 push eax 0x00000026 push edx 0x00000027 jmp 00007FC064DD4F7Eh 0x0000002c rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BD7CD3 second address: BD7CF9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FC064DA37C7h 0x00000008 pushad 0x00000009 popad 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push eax 0x0000000f push edx 0x00000010 push edx 0x00000011 pushad 0x00000012 popad 0x00000013 pop edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BD7CF9 second address: BD7D04 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jnl 00007FC064DD4F76h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BD800B second address: BD8037 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007FC064DA37B6h 0x0000000a popad 0x0000000b pop esi 0x0000000c push eax 0x0000000d pushad 0x0000000e jmp 00007FC064DA37C6h 0x00000013 push eax 0x00000014 push edx 0x00000015 jg 00007FC064DA37B6h 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BD86A2 second address: BD86B9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC064DD4F7Fh 0x00000009 popad 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BD86B9 second address: BD86BF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BD86BF second address: BD86CE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 mov eax, dword ptr [esp+04h] 0x0000000a push esi 0x0000000b push eax 0x0000000c push edx 0x0000000d push edx 0x0000000e pop edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C173E8 second address: C17411 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC064DA37BBh 0x00000007 jmp 00007FC064DA37C6h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C17411 second address: C17415 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C17550 second address: C17558 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C17558 second address: C1755C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C176B4 second address: C176B8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C176B8 second address: C176DD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007FC064DD4F76h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push edx 0x0000000d jmp 00007FC064DD4F81h 0x00000012 jno 00007FC064DD4F76h 0x00000018 pop edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C17817 second address: C1783A instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jg 00007FC064DA37C2h 0x0000000c jng 00007FC064DA37B8h 0x00000012 push edx 0x00000013 pop edx 0x00000014 push edi 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: B89389 second address: B8939E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop esi 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b push eax 0x0000000c push edx 0x0000000d jnl 00007FC064DD4F76h 0x00000013 pushad 0x00000014 popad 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: B8939E second address: B893A8 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FC064DA37B6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C1F7C6 second address: C1F7DA instructions: 0x00000000 rdtsc 0x00000002 jno 00007FC064DD4F7Ch 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push edx 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C1F7DA second address: C1F7E2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C23BFB second address: C23C05 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jbe 00007FC064DD4F76h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C23C05 second address: C23C09 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C297CE second address: C297E9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 popad 0x00000009 pushad 0x0000000a pushad 0x0000000b pushad 0x0000000c popad 0x0000000d jbe 00007FC064DD4F76h 0x00000013 jg 00007FC064DD4F76h 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C297E9 second address: C297F1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C297F1 second address: C297F7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C297F7 second address: C297FD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C297FD second address: C29823 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC064DD4F87h 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c ja 00007FC064DD4F76h 0x00000012 push ebx 0x00000013 pop ebx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C2995F second address: C29972 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC064DA37BAh 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C29972 second address: C29976 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C29976 second address: C2997A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C29D77 second address: C29D87 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push edx 0x00000007 pop edx 0x00000008 jno 00007FC064DD4F76h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C29D87 second address: C29D8D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C29D8D second address: C29D92 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BD81A5 second address: BD8207 instructions: 0x00000000 rdtsc 0x00000002 jg 00007FC064DA37BCh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dword ptr [esp], eax 0x0000000d mov dword ptr [ebp+122D30B5h], esi 0x00000013 mov ebx, dword ptr [ebp+124842EBh] 0x00000019 push 00000000h 0x0000001b push edx 0x0000001c call 00007FC064DA37B8h 0x00000021 pop edx 0x00000022 mov dword ptr [esp+04h], edx 0x00000026 add dword ptr [esp+04h], 00000015h 0x0000002e inc edx 0x0000002f push edx 0x00000030 ret 0x00000031 pop edx 0x00000032 ret 0x00000033 add eax, ebx 0x00000035 movzx edx, bx 0x00000038 nop 0x00000039 jmp 00007FC064DA37C9h 0x0000003e push eax 0x0000003f push eax 0x00000040 push edx 0x00000041 push edi 0x00000042 pushad 0x00000043 popad 0x00000044 pop edi 0x00000045 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BD8207 second address: BD8216 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FC064DD4F7Ah 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BD8216 second address: BD8253 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 nop 0x00000008 push 00000004h 0x0000000a push 00000000h 0x0000000c push ebx 0x0000000d call 00007FC064DA37B8h 0x00000012 pop ebx 0x00000013 mov dword ptr [esp+04h], ebx 0x00000017 add dword ptr [esp+04h], 00000016h 0x0000001f inc ebx 0x00000020 push ebx 0x00000021 ret 0x00000022 pop ebx 0x00000023 ret 0x00000024 push eax 0x00000025 push eax 0x00000026 push edx 0x00000027 pushad 0x00000028 pushad 0x00000029 popad 0x0000002a jmp 00007FC064DA37BEh 0x0000002f popad 0x00000030 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C2A04A second address: C2A04E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C2ECFD second address: C2ED01 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C2E0E3 second address: C2E0E9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C2E4E6 second address: C2E4F7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC064DA37BDh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C31EC0 second address: C31ECF instructions: 0x00000000 rdtsc 0x00000002 je 00007FC064DD4F7Ah 0x00000008 push edi 0x00000009 pop edi 0x0000000a pushad 0x0000000b popad 0x0000000c push edi 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C315B0 second address: C315CC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC064DA37C4h 0x00000007 push eax 0x00000008 push edx 0x00000009 push ebx 0x0000000a pop ebx 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C31B51 second address: C31B5B instructions: 0x00000000 rdtsc 0x00000002 jp 00007FC064DD4F76h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C31B5B second address: C31B61 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C31B61 second address: C31B65 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C31B65 second address: C31B6F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C31B6F second address: C31B73 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C31B73 second address: C31B77 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C341FE second address: C3420D instructions: 0x00000000 rdtsc 0x00000002 jng 00007FC064DD4F78h 0x00000008 pushad 0x00000009 popad 0x0000000a pushad 0x0000000b pushad 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C3A61D second address: C3A623 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C3A623 second address: C3A627 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C3A8F1 second address: C3A948 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 jnl 00007FC064DA37BAh 0x0000000b pushad 0x0000000c pushad 0x0000000d popad 0x0000000e jmp 00007FC064DA37BFh 0x00000013 push esi 0x00000014 pop esi 0x00000015 popad 0x00000016 pushad 0x00000017 jmp 00007FC064DA37C1h 0x0000001c jmp 00007FC064DA37C3h 0x00000021 popad 0x00000022 popad 0x00000023 push eax 0x00000024 push edx 0x00000025 jmp 00007FC064DA37BAh 0x0000002a rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C3B1A5 second address: C3B1AB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C3B1AB second address: C3B1B3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push ebx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C3B1B3 second address: C3B1BF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop ebx 0x00000007 pop edx 0x00000008 push esi 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C3B1BF second address: C3B1D2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC064DA37BDh 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C3B7AB second address: C3B7C6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC064DD4F80h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push edi 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C3C33D second address: C3C343 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C3F7A9 second address: C3F7B4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push edx 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ebx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C3FACF second address: C3FAE0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FC064DA37BDh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C3FC55 second address: C3FC6B instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jmp 00007FC064DD4F7Bh 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C3FC6B second address: C3FC76 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 push ecx 0x00000008 pop ecx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C3FC76 second address: C3FC7A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C3FC7A second address: C3FC80 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C3FE06 second address: C3FE20 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC064DD4F86h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C3FE20 second address: C3FE29 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C400C8 second address: C400CE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C400CE second address: C400D4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C400D4 second address: C40101 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007FC064DD4F76h 0x0000000a popad 0x0000000b pop edi 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f jnl 00007FC064DD4F76h 0x00000015 jmp 00007FC064DD4F88h 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C40101 second address: C40105 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C40105 second address: C40148 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC064DD4F89h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c push edx 0x0000000d pop edx 0x0000000e jg 00007FC064DD4F76h 0x00000014 push ecx 0x00000015 pop ecx 0x00000016 popad 0x00000017 push eax 0x00000018 push edx 0x00000019 jmp 00007FC064DD4F80h 0x0000001e jg 00007FC064DD4F76h 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C4CEDC second address: C4CEE0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C4D360 second address: C4D37F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007FC064DD4F76h 0x0000000a jmp 00007FC064DD4F81h 0x0000000f popad 0x00000010 push ebx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C4D37F second address: C4D392 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC064DA37BEh 0x00000009 pop ebx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C4D392 second address: C4D3AA instructions: 0x00000000 rdtsc 0x00000002 jno 00007FC064DD4F7Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a je 00007FC064DD4F76h 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C4D3AA second address: C4D3AE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C4D4F0 second address: C4D4F9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 push edx 0x00000007 pop edx 0x00000008 popad 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C4D7DD second address: C4D7E8 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pop edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C4DA57 second address: C4DA7A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC064DD4F83h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jnl 00007FC064DD4F7Ah 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C4C99B second address: C4C99F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C546DE second address: C546E3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C546E3 second address: C546F5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push ebx 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C546F5 second address: C546FB instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C5427D second address: C54282 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C664B2 second address: C664B6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C664B6 second address: C664BA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C664BA second address: C664DA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC064DD4F7Ch 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jc 00007FC064DD4F82h 0x00000011 jns 00007FC064DD4F76h 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C666B3 second address: C666BB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C666BB second address: C666BF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C68247 second address: C6826E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC064DA37BFh 0x00000007 jng 00007FC064DA37B6h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007FC064DA37BCh 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C6826E second address: C68272 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C68272 second address: C68283 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push edx 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a pop edx 0x0000000b push eax 0x0000000c push edx 0x0000000d push ebx 0x0000000e pop ebx 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C6CE91 second address: C6CE97 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C6CE97 second address: C6CE9B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: B8795C second address: B87990 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnp 00007FC064DD4F76h 0x0000000a pop eax 0x0000000b push ecx 0x0000000c jmp 00007FC064DD4F80h 0x00000011 pushad 0x00000012 popad 0x00000013 pop ecx 0x00000014 je 00007FC064DD4F7Eh 0x0000001a jno 00007FC064DD4F76h 0x00000020 pushad 0x00000021 popad 0x00000022 popad 0x00000023 push eax 0x00000024 push edx 0x00000025 push eax 0x00000026 push edx 0x00000027 push eax 0x00000028 push edx 0x00000029 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: B87990 second address: B87994 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: B87994 second address: B879AA instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jl 00007FC064DD4F7Eh 0x0000000e jo 00007FC064DD4F76h 0x00000014 push esi 0x00000015 pop esi 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: B879AA second address: B879B0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C7605C second address: C76075 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FC064DD4F82h 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C7BB2E second address: C7BB34 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C7D11D second address: C7D121 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C7D121 second address: C7D127 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C828FF second address: C82903 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C82903 second address: C82907 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C82907 second address: C8290D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C8290D second address: C82916 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C82D02 second address: C82D24 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 jmp 00007FC064DD4F81h 0x0000000e pop edx 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 pushad 0x00000013 popad 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C82D24 second address: C82D29 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C82D29 second address: C82D33 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FC064DD4F7Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C86953 second address: C86971 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC064DA37C3h 0x00000009 pop esi 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C86971 second address: C86987 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC064DD4F7Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push edi 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C89E56 second address: C89E5A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C972D1 second address: C972D5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C972D5 second address: C972EB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 je 00007FC064DA37B6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jc 00007FC064DA37BEh 0x00000012 push eax 0x00000013 pop eax 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: C942EC second address: C942F2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: CA6CD5 second address: CA6CF5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC064DA37C9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: CA6CF5 second address: CA6CFB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: CA6CFB second address: CA6D21 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 popad 0x00000006 jc 00007FC064DA37E7h 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FC064DA37C6h 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: CA6D21 second address: CA6D25 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: CBBB7C second address: CBBB81 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: CBBB81 second address: CBBB8B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jng 00007FC064DD4F76h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: CBBB8B second address: CBBB8F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: CBA9DA second address: CBA9DE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: CBB5C3 second address: CBB5C9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: CBB5C9 second address: CBB5CD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: CBB5CD second address: CBB5DD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ecx 0x00000007 jg 00007FC064DA37B6h 0x0000000d pushad 0x0000000e popad 0x0000000f pop ecx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: CBB5DD second address: CBB5ED instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pushad 0x00000004 popad 0x00000005 push ecx 0x00000006 pop ecx 0x00000007 pop ecx 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: CBB5ED second address: CBB60D instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ecx 0x00000007 jmp 00007FC064DA37C8h 0x0000000c pop ecx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: CBB7E4 second address: CBB7E8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: CBB7E8 second address: CBB7EE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: CBB7EE second address: CBB7FE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 jl 00007FC064DD4FC1h 0x0000000d push eax 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: CBE799 second address: CBE7BC instructions: 0x00000000 rdtsc 0x00000002 jo 00007FC064DA37B8h 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov eax, dword ptr [eax] 0x0000000e jo 00007FC064DA37DFh 0x00000014 push eax 0x00000015 push edx 0x00000016 jmp 00007FC064DA37BDh 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: CBFD0F second address: CBFD19 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: CBFD19 second address: CBFD29 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC064DA37BCh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: CBFD29 second address: CBFD6A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC064DD4F88h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FC064DD4F80h 0x00000010 pushad 0x00000011 jns 00007FC064DD4F76h 0x00000017 jmp 00007FC064DD4F7Bh 0x0000001c popad 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: CC17AE second address: CC17BA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: CC17BA second address: CC17C6 instructions: 0x00000000 rdtsc 0x00000002 jng 00007FC064DD4F76h 0x00000008 push edx 0x00000009 pop edx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: CC37B3 second address: CC37E0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007FC064DA37B6h 0x0000000a jmp 00007FC064DA37C8h 0x0000000f popad 0x00000010 push eax 0x00000011 pushad 0x00000012 popad 0x00000013 jc 00007FC064DA37B6h 0x00000019 pop eax 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: CC37E0 second address: CC37EA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jp 00007FC064DD4F76h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: CC37EA second address: CC37F0 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BD0F9A second address: BD0F9E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: BD0F9E second address: BD0FA4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DD0863 second address: 4DD0869 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DD0869 second address: 4DD08CF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jmp 00007FC064DA37C6h 0x0000000e xchg eax, ebp 0x0000000f jmp 00007FC064DA37C0h 0x00000014 mov ebp, esp 0x00000016 jmp 00007FC064DA37C0h 0x0000001b xchg eax, ecx 0x0000001c jmp 00007FC064DA37C0h 0x00000021 push eax 0x00000022 jmp 00007FC064DA37BBh 0x00000027 xchg eax, ecx 0x00000028 push eax 0x00000029 push edx 0x0000002a push eax 0x0000002b push edx 0x0000002c pushad 0x0000002d popad 0x0000002e rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DD08CF second address: 4DD08D3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DD08D3 second address: 4DD08D9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DD08D9 second address: 4DD0913 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007FC064DD4F88h 0x00000008 pop ecx 0x00000009 mov cx, dx 0x0000000c popad 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 jmp 00007FC064DD4F7Fh 0x00000018 mov cx, 32DFh 0x0000001c popad 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DD0913 second address: 4DD0919 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DD0919 second address: 4DD091D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DD091D second address: 4DD0955 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], esi 0x0000000b jmp 00007FC064DA37C3h 0x00000010 lea eax, dword ptr [ebp-04h] 0x00000013 push eax 0x00000014 push edx 0x00000015 jmp 00007FC064DA37C5h 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DD0955 second address: 4DD097A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC064DD4F81h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FC064DD4F7Dh 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DD097A second address: 4DD0980 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DD0A9A second address: 4DC01C0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC064DD4F89h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop esi 0x0000000a pushad 0x0000000b mov ax, 6423h 0x0000000f movzx esi, bx 0x00000012 popad 0x00000013 leave 0x00000014 jmp 00007FC064DD4F7Bh 0x00000019 retn 0004h 0x0000001c nop 0x0000001d cmp eax, 00000000h 0x00000020 setne al 0x00000023 xor ebx, ebx 0x00000025 test al, 01h 0x00000027 jne 00007FC064DD4F77h 0x00000029 sub esp, 04h 0x0000002c mov dword ptr [esp], 0000000Dh 0x00000033 call 00007FC0691945E8h 0x00000038 mov edi, edi 0x0000003a push eax 0x0000003b push edx 0x0000003c jmp 00007FC064DD4F7Bh 0x00000041 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DC01C0 second address: 4DC02CD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FC064DA37BFh 0x00000009 or si, 598Eh 0x0000000e jmp 00007FC064DA37C9h 0x00000013 popfd 0x00000014 mov bh, ah 0x00000016 popad 0x00000017 pop edx 0x00000018 pop eax 0x00000019 push ebx 0x0000001a jmp 00007FC064DA37C8h 0x0000001f mov dword ptr [esp], ebp 0x00000022 pushad 0x00000023 mov esi, 3D42EF4Dh 0x00000028 movzx esi, dx 0x0000002b popad 0x0000002c mov ebp, esp 0x0000002e pushad 0x0000002f pushfd 0x00000030 jmp 00007FC064DA37BBh 0x00000035 sbb cx, 5CFEh 0x0000003a jmp 00007FC064DA37C9h 0x0000003f popfd 0x00000040 mov bx, si 0x00000043 popad 0x00000044 sub esp, 2Ch 0x00000047 pushad 0x00000048 mov eax, 2270463Fh 0x0000004d jmp 00007FC064DA37C4h 0x00000052 popad 0x00000053 xchg eax, ebx 0x00000054 jmp 00007FC064DA37C0h 0x00000059 push eax 0x0000005a jmp 00007FC064DA37BBh 0x0000005f xchg eax, ebx 0x00000060 pushad 0x00000061 mov esi, 62287D2Bh 0x00000066 pushfd 0x00000067 jmp 00007FC064DA37C0h 0x0000006c add esi, 72EA70B8h 0x00000072 jmp 00007FC064DA37BBh 0x00000077 popfd 0x00000078 popad 0x00000079 xchg eax, edi 0x0000007a push eax 0x0000007b push edx 0x0000007c jmp 00007FC064DA37C5h 0x00000081 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DC02CD second address: 4DC02ED instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov bx, AEE2h 0x00000007 mov bx, D72Eh 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f pushad 0x00000010 mov esi, 4BFF80E1h 0x00000015 mov di, cx 0x00000018 popad 0x00000019 xchg eax, edi 0x0000001a push eax 0x0000001b push edx 0x0000001c push eax 0x0000001d push edx 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DC02ED second address: 4DC02F1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DC02F1 second address: 4DC0306 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC064DD4F81h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DC0306 second address: 4DC0316 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FC064DA37BCh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DC0383 second address: 4DC03B5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC064DD4F82h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a test al, al 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FC064DD4F87h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DC0454 second address: 4DC04A5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC064DA37C9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a jmp 00007FC064DA37BEh 0x0000000f push eax 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 pushfd 0x00000014 jmp 00007FC064DA37BCh 0x00000019 sbb cx, 0798h 0x0000001e jmp 00007FC064DA37BBh 0x00000023 popfd 0x00000024 push esi 0x00000025 pop ebx 0x00000026 popad 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DC050D second address: 4DC0513 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DC0513 second address: 4DC0535 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC064DA37C2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 js 00007FC064DA3846h 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 popad 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DC0535 second address: 4DC053B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DC053B second address: 4DC055E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FC064DA37C2h 0x00000008 mov dx, cx 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e cmp dword ptr [ebp-14h], edi 0x00000011 pushad 0x00000012 push eax 0x00000013 push edx 0x00000014 mov bh, ah 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DC055E second address: 4DC059E instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushfd 0x00000009 jmp 00007FC064DD4F87h 0x0000000e sbb eax, 0D23B7EEh 0x00000014 jmp 00007FC064DD4F89h 0x00000019 popfd 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DC059E second address: 4DC05C9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC064DA37C0h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a jne 00007FC0D5C0169Eh 0x00000010 pushad 0x00000011 mov ebx, ecx 0x00000013 mov edi, esi 0x00000015 popad 0x00000016 mov ebx, dword ptr [ebp+08h] 0x00000019 push eax 0x0000001a push edx 0x0000001b pushad 0x0000001c pushad 0x0000001d popad 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DC05C9 second address: 4DC05CE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DC05CE second address: 4DC05EB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FC064DA37C9h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DC05EB second address: 4DC065E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 lea eax, dword ptr [ebp-2Ch] 0x0000000b jmp 00007FC064DD4F7Dh 0x00000010 xchg eax, esi 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 pushfd 0x00000015 jmp 00007FC064DD4F83h 0x0000001a and eax, 29190D6Eh 0x00000020 jmp 00007FC064DD4F89h 0x00000025 popfd 0x00000026 pushfd 0x00000027 jmp 00007FC064DD4F80h 0x0000002c adc si, F0E8h 0x00000031 jmp 00007FC064DD4F7Bh 0x00000036 popfd 0x00000037 popad 0x00000038 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DC065E second address: 4DC0664 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DC0664 second address: 4DC0668 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DC0668 second address: 4DC0680 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FC064DA37BDh 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DC0680 second address: 4DC0685 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DC0685 second address: 4DC06D4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 mov esi, ebx 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, esi 0x0000000a jmp 00007FC064DA37BFh 0x0000000f nop 0x00000010 jmp 00007FC064DA37C6h 0x00000015 push eax 0x00000016 pushad 0x00000017 mov eax, ebx 0x00000019 mov cx, bx 0x0000001c popad 0x0000001d nop 0x0000001e jmp 00007FC064DA37BFh 0x00000023 xchg eax, ebx 0x00000024 push eax 0x00000025 push edx 0x00000026 push eax 0x00000027 push edx 0x00000028 push eax 0x00000029 push edx 0x0000002a rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DC06D4 second address: 4DC06D8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DC06D8 second address: 4DC06DC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DC06DC second address: 4DC06E2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DC0771 second address: 4DC0777 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DC0777 second address: 4DC07B0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC064DD4F88h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b test esi, esi 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007FC064DD4F87h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DC07B0 second address: 4DC0034 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 mov ebx, 6363E178h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d je 00007FC0D5C0164Eh 0x00000013 xor eax, eax 0x00000015 jmp 00007FC064D7CEEAh 0x0000001a pop esi 0x0000001b pop edi 0x0000001c pop ebx 0x0000001d leave 0x0000001e retn 0004h 0x00000021 nop 0x00000022 cmp eax, 00000000h 0x00000025 setne cl 0x00000028 xor ebx, ebx 0x0000002a test cl, 00000001h 0x0000002d jne 00007FC064DA37B7h 0x0000002f jmp 00007FC064DA38F3h 0x00000034 call 00007FC069162B21h 0x00000039 mov edi, edi 0x0000003b jmp 00007FC064DA37BBh 0x00000040 xchg eax, ebp 0x00000041 pushad 0x00000042 mov di, cx 0x00000045 jmp 00007FC064DA37C0h 0x0000004a popad 0x0000004b push eax 0x0000004c push eax 0x0000004d push edx 0x0000004e jmp 00007FC064DA37BEh 0x00000053 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DC0034 second address: 4DC004B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007FC064DD4F81h 0x00000008 pop esi 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DC004B second address: 4DC0071 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 xchg eax, ebp 0x00000008 jmp 00007FC064DA37BDh 0x0000000d mov ebp, esp 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007FC064DA37BDh 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DC0071 second address: 4DC00ED instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007FC064DD4F87h 0x00000008 pop ecx 0x00000009 pushfd 0x0000000a jmp 00007FC064DD4F89h 0x0000000f adc si, 8166h 0x00000014 jmp 00007FC064DD4F81h 0x00000019 popfd 0x0000001a popad 0x0000001b pop edx 0x0000001c pop eax 0x0000001d xchg eax, ecx 0x0000001e pushad 0x0000001f mov di, si 0x00000022 push eax 0x00000023 push edx 0x00000024 pushfd 0x00000025 jmp 00007FC064DD4F86h 0x0000002a sbb ch, 00000038h 0x0000002d jmp 00007FC064DD4F7Bh 0x00000032 popfd 0x00000033 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DC0B25 second address: 4DC0B42 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC064DA37C9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DC0B42 second address: 4DC0B8D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC064DD4F81h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a pushad 0x0000000b pushfd 0x0000000c jmp 00007FC064DD4F7Ch 0x00000011 and ch, 00000048h 0x00000014 jmp 00007FC064DD4F7Bh 0x00000019 popfd 0x0000001a push eax 0x0000001b push edx 0x0000001c jmp 00007FC064DD4F86h 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DC0B8D second address: 4DC0BA4 instructions: 0x00000000 rdtsc 0x00000002 mov ah, E4h 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 pushad 0x00000009 mov dx, A5ECh 0x0000000d popad 0x0000000e xchg eax, ebp 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 mov edx, ecx 0x00000014 push esi 0x00000015 pop edx 0x00000016 popad 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DC0BA4 second address: 4DC0BF2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FC064DD4F7Bh 0x00000008 push esi 0x00000009 pop edi 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d mov ebp, esp 0x0000000f pushad 0x00000010 mov dl, ch 0x00000012 pushfd 0x00000013 jmp 00007FC064DD4F7Dh 0x00000018 adc ax, E726h 0x0000001d jmp 00007FC064DD4F81h 0x00000022 popfd 0x00000023 popad 0x00000024 cmp dword ptr [75C7459Ch], 05h 0x0000002b push eax 0x0000002c push edx 0x0000002d pushad 0x0000002e mov si, dx 0x00000031 mov eax, edx 0x00000033 popad 0x00000034 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DC0BF2 second address: 4DC0C35 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC064DA37C0h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 je 00007FC0D5BF15AFh 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 pushfd 0x00000013 jmp 00007FC064DA37BDh 0x00000018 or cx, 29E6h 0x0000001d jmp 00007FC064DA37C1h 0x00000022 popfd 0x00000023 popad 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DC0C35 second address: 4DC0C4C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC064DD4F7Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DC0C4C second address: 4DC0C52 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DC0C52 second address: 4DC0C58 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DC0C58 second address: 4DC0C5C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DC0C99 second address: 4DC0CE3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC064DD4F7Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xor dword ptr [esp], 2BF626FBh 0x00000010 jmp 00007FC064DD4F86h 0x00000015 call 00007FC0D5C29E23h 0x0000001a push 75C12B70h 0x0000001f push dword ptr fs:[00000000h] 0x00000026 mov eax, dword ptr [esp+10h] 0x0000002a mov dword ptr [esp+10h], ebp 0x0000002e lea ebp, dword ptr [esp+10h] 0x00000032 sub esp, eax 0x00000034 push ebx 0x00000035 push esi 0x00000036 push edi 0x00000037 mov eax, dword ptr [75C74538h] 0x0000003c xor dword ptr [ebp-04h], eax 0x0000003f xor eax, ebp 0x00000041 push eax 0x00000042 mov dword ptr [ebp-18h], esp 0x00000045 push dword ptr [ebp-08h] 0x00000048 mov eax, dword ptr [ebp-04h] 0x0000004b mov dword ptr [ebp-04h], FFFFFFFEh 0x00000052 mov dword ptr [ebp-08h], eax 0x00000055 lea eax, dword ptr [ebp-10h] 0x00000058 mov dword ptr fs:[00000000h], eax 0x0000005e ret 0x0000005f push eax 0x00000060 push edx 0x00000061 jmp 00007FC064DD4F87h 0x00000066 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DC0CE3 second address: 4DC0D39 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC064DA37C9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 sub esi, esi 0x0000000b jmp 00007FC064DA37C7h 0x00000010 mov dword ptr [ebp-1Ch], esi 0x00000013 push eax 0x00000014 push edx 0x00000015 pushad 0x00000016 push edx 0x00000017 pop eax 0x00000018 jmp 00007FC064DA37C7h 0x0000001d popad 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DC0D6A second address: 4DC0DB7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC064DD4F81h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 test al, al 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e mov eax, edx 0x00000010 pushfd 0x00000011 jmp 00007FC064DD4F7Fh 0x00000016 and eax, 76EEDCCEh 0x0000001c jmp 00007FC064DD4F89h 0x00000021 popfd 0x00000022 popad 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DC0DB7 second address: 4DC0E31 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC064DA37C1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 je 00007FC0D5BE736Fh 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 pushfd 0x00000013 jmp 00007FC064DA37C3h 0x00000018 or ecx, 7CB5078Eh 0x0000001e jmp 00007FC064DA37C9h 0x00000023 popfd 0x00000024 pushfd 0x00000025 jmp 00007FC064DA37C0h 0x0000002a jmp 00007FC064DA37C5h 0x0000002f popfd 0x00000030 popad 0x00000031 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DC0E31 second address: 4DC0E37 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DC0E37 second address: 4DC0E3B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DC0E3B second address: 4DC0E3F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DC0E3F second address: 4DC0E62 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 cmp dword ptr [ebp+08h], 00002000h 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007FC064DA37C2h 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DD0B36 second address: 4DD0B3A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DD0B3A second address: 4DD0B40 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DD0B40 second address: 4DD0B6E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC064DD4F82h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, esi 0x0000000a pushad 0x0000000b mov esi, 7C9837CDh 0x00000010 mov bl, cl 0x00000012 popad 0x00000013 push eax 0x00000014 push eax 0x00000015 push edx 0x00000016 jmp 00007FC064DD4F7Bh 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DD0B6E second address: 4DD0B9D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov dl, 19h 0x00000005 pushfd 0x00000006 jmp 00007FC064DA37C0h 0x0000000b xor si, 3348h 0x00000010 jmp 00007FC064DA37BBh 0x00000015 popfd 0x00000016 popad 0x00000017 pop edx 0x00000018 pop eax 0x00000019 xchg eax, esi 0x0000001a pushad 0x0000001b pushad 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DD0B9D second address: 4DD0BCF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 call 00007FC064DD4F80h 0x00000009 pop esi 0x0000000a popad 0x0000000b mov ah, bh 0x0000000d popad 0x0000000e mov esi, dword ptr [ebp+0Ch] 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 call 00007FC064DD4F7Fh 0x00000019 pop eax 0x0000001a mov eax, ebx 0x0000001c popad 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DD0BCF second address: 4DD0BD4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DD0BD4 second address: 4DD0BF7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 mov cx, A0DDh 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b test esi, esi 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007FC064DD4F82h 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DD0BF7 second address: 4DD0C06 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC064DA37BBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DD0C06 second address: 4DD0C0C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DD0C0C second address: 4DD0C10 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DD0C10 second address: 4DD0CD4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 je 00007FC0D5C12715h 0x0000000e jmp 00007FC064DD4F87h 0x00000013 cmp dword ptr [75C7459Ch], 05h 0x0000001a pushad 0x0000001b mov di, ax 0x0000001e pushad 0x0000001f jmp 00007FC064DD4F7Eh 0x00000024 pushfd 0x00000025 jmp 00007FC064DD4F82h 0x0000002a jmp 00007FC064DD4F85h 0x0000002f popfd 0x00000030 popad 0x00000031 popad 0x00000032 je 00007FC0D5C2A793h 0x00000038 pushad 0x00000039 movzx ecx, dx 0x0000003c pushfd 0x0000003d jmp 00007FC064DD4F89h 0x00000042 or ecx, 691CB0A6h 0x00000048 jmp 00007FC064DD4F81h 0x0000004d popfd 0x0000004e popad 0x0000004f xchg eax, esi 0x00000050 push eax 0x00000051 push edx 0x00000052 push eax 0x00000053 push edx 0x00000054 jmp 00007FC064DD4F88h 0x00000059 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DD0CD4 second address: 4DD0CDA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DD0CDA second address: 4DD0CFD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC064DD4F7Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FC064DD4F7Eh 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DD0CFD second address: 4DD0D12 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC064DA37BBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, esi 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DD0D12 second address: 4DD0D19 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop ecx 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DD0D44 second address: 4DD0D61 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC064DA37C9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DD0D61 second address: 4DD0DE0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FC064DD4F87h 0x00000009 sbb ch, 0000000Eh 0x0000000c jmp 00007FC064DD4F89h 0x00000011 popfd 0x00000012 pushfd 0x00000013 jmp 00007FC064DD4F80h 0x00000018 adc ch, FFFFFF88h 0x0000001b jmp 00007FC064DD4F7Bh 0x00000020 popfd 0x00000021 popad 0x00000022 pop edx 0x00000023 pop eax 0x00000024 push eax 0x00000025 push eax 0x00000026 push edx 0x00000027 pushad 0x00000028 call 00007FC064DD4F82h 0x0000002d pop esi 0x0000002e call 00007FC064DD4F7Bh 0x00000033 pop esi 0x00000034 popad 0x00000035 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DD0DE0 second address: 4DD0E01 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC064DA37C6h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, esi 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DD0E01 second address: 4DD0E05 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DD0E05 second address: 4DD0E0B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DD0E77 second address: 4DD0E7D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | RDTSC instruction interceptor: First address: 4DD0E7D second address: 4DD0E81 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnm | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajb | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappafln | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdm | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafa | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.js | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdo | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopg | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoa | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdph | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkld | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolaf | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddfffla | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnid | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfci | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjeh | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemg | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhae | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\key4.db | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliof | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneec | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmon | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhm | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcm | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcob | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjh | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\abogmiocnneedmmepnohnhlijcjpcifd | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflc | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbg | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahd | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhk | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbai | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgn | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpi | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifb | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgk | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbai | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkd | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For Account | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimn | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfj | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohao | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For Account | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjk | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnf | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofec | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihd | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcje | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaoc | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdno | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdaf | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cert9.db | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkm | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\formhistory.sqlite | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbic | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoadd | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhi | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeap | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihoh | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpa | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbn | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaad | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\logins.json | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilc | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclg | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoa | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchh | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfdd | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpak | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjp | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpo | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgpp | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblb | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbch | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbm | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbch | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfe | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmj | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffne | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklk | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdma | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdil | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapac | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnkno | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimig | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncg | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolb | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcob | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnba | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddfffla | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjih | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcge | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgik | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhad | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgef | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbb | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkp | Jump to behavior |
Source: C:\Users\user\Desktop\JqGBbm7.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcellj | Jump to behavior |