Source: C:\Windows\System32\loaddll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CCEEAC9 second address: 000000006CCEEEF8 instructions: 0x00000000 rdtsc 0x00000002 mov dl, F2h 0x00000004 bswap ecx 0x00000006 call 00007FE5150D13DAh 0x0000000b jmp 00007FE5150D142Bh 0x0000000d lea ebx, dword ptr [ebx+55h] 0x00000010 lea ecx, dword ptr [00000000h+ebx*4] 0x00000017 bsr bp, cx 0x0000001b rcl ecx, 19h 0x0000001e xchg dword ptr [esp+04h], ebx 0x00000022 jmp 00007FE5150D185Bh 0x00000027 mov al, F1h 0x00000029 rcl bx, 1 0x0000002c inc bx 0x0000002e sub esp, 1Eh 0x00000031 ror ax, 0002h 0x00000035 lea esp, dword ptr [esp+02h] 0x00000039 jmp 00007FE5150D13C0h 0x0000003b push dword ptr [esp+20h] 0x0000003f retn 0024h 0x00000042 lea edi, dword ptr [esp+0Ch] 0x00000046 mov dl, byte ptr [esp] 0x00000049 jmp 00007FE5150D186Ah 0x0000004e sub esp, 000000B4h 0x00000054 mov ebp, esp 0x00000056 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CCFB709 second address: 000000006CCFB85B instructions: 0x00000000 rdtsc 0x00000002 mov ah, byte ptr [esp] 0x00000005 jmp 00007FE5151CE62Dh 0x00000007 mov dh, byte ptr [esp] 0x0000000a jmp 00007FE5151CE640h 0x0000000c mov ecx, edi 0x0000000e mov esi, dword ptr [ecx] 0x00000010 bsf ecx, ecx 0x00000013 jnp 00007FE5151CE5F3h 0x00000015 jmp 00007FE5151CE6A5h 0x0000001a mov al, 96h 0x0000001c xchg edx, ecx 0x0000001e add edi, 04h 0x00000021 jmp 00007FE5151CE5C9h 0x00000023 btc edx, esi 0x00000026 je 00007FE5151CE5F7h 0x00000028 bsr eax, edi 0x0000002b setnl dh 0x0000002e jmp 00007FE5151CE62Ch 0x00000030 push ebp 0x00000031 lea ecx, dword ptr [ecx+esi] 0x00000034 call 00007FE5151CE5F2h 0x00000039 mov ch, byte ptr [esp] 0x0000003c push esi 0x0000003d jmp 00007FE5151CE692h 0x00000042 and ebp, esi 0x00000044 jns 00007FE5151CE5DEh 0x00000046 mov cx, word ptr [esp] 0x0000004a mov cl, byte ptr [esp] 0x0000004d jmp 00007FE5151CE5EFh 0x0000004f dec ax 0x00000051 push edi 0x00000052 mov dx, 9280h 0x00000056 mov dx, B8F4h 0x0000005a jmp 00007FE5151CE628h 0x0000005c mov bp, word ptr [esp] 0x00000060 sbb ax, bp 0x00000063 jmp 00007FE5151CE659h 0x00000065 jnc 00007FE5151CE5CDh 0x00000067 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CCFB85B second address: 000000006CCFB903 instructions: 0x00000000 rdtsc 0x00000002 lea eax, dword ptr [eax+ebx] 0x00000005 jmp 00007FE5150D13DFh 0x00000007 cmp eax, 9DA45E12h 0x0000000c push si 0x0000000e lea esp, dword ptr [esp+02h] 0x00000012 jmp 00007FE5150D142Eh 0x00000014 pop esi 0x00000015 mov al, dl 0x00000017 mov al, dl 0x00000019 clc 0x0000001a jnp 00007FE5150D13E4h 0x0000001c jp 00007FE5150D1476h 0x0000001e pop ebp 0x0000001f mov ch, 2Fh 0x00000021 mov ax, BE00h 0x00000025 or eax, ebx 0x00000027 jnle 00007FE5150D13C1h 0x00000029 jle 00007FE5150D13A9h 0x0000002b add esp, 04h 0x0000002e jnbe 00007FE5150D142Bh 0x00000030 pushfd 0x00000031 mov cx, word ptr [esp+02h] 0x00000036 jmp 00007FE5150D13E4h 0x00000038 lea edi, dword ptr [ecx+ebx] 0x0000003b mov edi, dword ptr [esp+04h] 0x0000003f mov edx, 6C4C3A78h 0x00000044 push dx 0x00000046 jmp 00007FE5150D1410h 0x00000048 lea esp, dword ptr [esp+02h] 0x0000004c lea esp, dword ptr [esp+08h] 0x00000050 call 00007FE5150D1431h 0x00000055 mov ax, dx 0x00000058 mov cl, B9h 0x0000005a bt dx, bx 0x0000005e xchg dword ptr [esp], ecx 0x00000061 jmp 00007FE5150D13DEh 0x00000063 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CCFB903 second address: 000000006CCECBBE instructions: 0x00000000 rdtsc 0x00000002 sub edx, eax 0x00000004 mov ax, bx 0x00000007 add dx, dx 0x0000000a mov ah, E4h 0x0000000c jmp 00007FE5151CE628h 0x0000000e lea ecx, dword ptr [ecx-0000ED1Ch] 0x00000014 mov dx, AE09h 0x00000018 mov eax, dword ptr [esp] 0x0000001b btc ax, si 0x0000001f call 00007FE5151CE8CDh 0x00000024 xchg dword ptr [esp+04h], ecx 0x00000028 mov ch, byte ptr [esp] 0x0000002b jmp 00007FE5151CE443h 0x00000030 sub esp, 16h 0x00000033 mov ax, word ptr [esp+07h] 0x00000038 mov ecx, dword ptr [esp+12h] 0x0000003c add esp, 07h 0x0000003f lea esp, dword ptr [esp+03h] 0x00000043 push dword ptr [esp+10h] 0x00000047 retn 0014h 0x0000004a mov ebx, ebp 0x0000004c lea eax, dword ptr [esp+ecx] 0x0000004f setle ah 0x00000052 sets dl 0x00000055 call 00007FE5151CE5EFh 0x0000005a xchg cl, ch 0x0000005c pushad 0x0000005d rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CCECBBE second address: 000000006CCECBE2 instructions: 0x00000000 rdtsc 0x00000002 mov al, bh 0x00000004 xchg dword ptr [esp+20h], esi 0x00000008 jmp 00007FE5150D141Ch 0x0000000a rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CCECBE2 second address: 000000006CCECCAF instructions: 0x00000000 rdtsc 0x00000002 xchg ecx, edx 0x00000004 mov ax, word ptr [esp] 0x00000008 mov edx, B68AAC39h 0x0000000d lea esi, dword ptr [esi-00000052h] 0x00000013 xchg eax, edx 0x00000014 jmp 00007FE5151CE633h 0x00000016 mov edx, ecx 0x00000018 lea eax, dword ptr [00000000h+edi*4] 0x0000001f mov dx, 208Bh 0x00000023 xchg dword ptr [esp+20h], esi 0x00000027 mov cl, ch 0x00000029 xchg dx, ax 0x0000002c jmp 00007FE5151CE5E3h 0x0000002e xchg dx, ax 0x00000031 mov ecx, dword ptr [esp] 0x00000034 push dword ptr [esp+20h] 0x00000038 retn 0024h 0x0000003b mov eax, 12F33EA2h 0x00000040 xor cl, 00000044h 0x00000043 jnl 00007FE5151CE6F0h 0x00000049 pushfd 0x0000004a mov dx, cx 0x0000004d mov dh, 56h 0x0000004f lea eax, dword ptr [ebx-03h] 0x00000052 lea ecx, dword ptr [ecx-0F5291AAh] 0x00000058 lea esp, dword ptr [esp+04h] 0x0000005c sub ebp, 1284C013h 0x00000062 call 00007FE5151CE62Ch 0x00000067 mov ecx, dword ptr [esp] 0x0000006a rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CCECCAF second address: 000000006CCECC9D instructions: 0x00000000 rdtsc 0x00000002 neg al 0x00000004 neg al 0x00000006 push sp 0x00000008 jmp 00007FE5150D13DFh 0x0000000a lea esp, dword ptr [esp+02h] 0x0000000e xchg dword ptr [esp], ebx 0x00000011 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CCECC9D second address: 000000006CCECCC5 instructions: 0x00000000 rdtsc 0x00000002 mov edx, 93656786h 0x00000007 jmp 00007FE5151CE625h 0x00000009 mov edx, dword ptr [esp] 0x0000000c lea ebx, dword ptr [ebx-00000034h] 0x00000012 shr eax, 0Ch 0x00000015 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CCECE39 second address: 000000006CCECE3D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5150D13BFh 0x00000004 xor ebp, 2D4823BBh 0x0000000a mov ah, byte ptr [esp] 0x0000000d clc 0x0000000e je 00007FE5150D13E0h 0x00000010 jne 00007FE5150D140Ah 0x00000012 mov eax, 09013DC9h 0x00000017 sub esp, 19h 0x0000001a lea esp, dword ptr [esp+01h] 0x0000001e jmp 00007FE5150D1486h 0x00000023 add ebp, dword ptr [esi] 0x00000025 lea eax, dword ptr [00000000h+edx*4] 0x0000002c xchg ch, cl 0x0000002e jmp 00007FE5150D13ADh 0x00000030 movzx ecx, byte ptr [ebp+00h] 0x00000034 jmp 00007FE5150D13DFh 0x00000036 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CCECE3D second address: 000000006CCECEB5 instructions: 0x00000000 rdtsc 0x00000002 clc 0x00000003 jnbe 00007FE5151CE646h 0x00000005 not ax 0x00000008 call 00007FE5151CE5F7h 0x0000000d mov ax, di 0x00000010 jmp 00007FE5151CE62Bh 0x00000012 mov edx, dword ptr [esp] 0x00000015 add esp, 02h 0x00000018 jmp 00007FE5151CE66Dh 0x0000001a jnle 00007FE5151CE5B9h 0x0000001c mov dl, dh 0x0000001e mov dh, byte ptr [esp+01h] 0x00000022 call 00007FE5151CE649h 0x00000027 lea esp, dword ptr [esp+02h] 0x0000002b jmp 00007FE5151CE5F6h 0x0000002d add cl, bl 0x0000002f rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CCED042 second address: 000000006CCED0C7 instructions: 0x00000000 rdtsc 0x00000002 btr eax, ebp 0x00000005 jnp 00007FE5150D1449h 0x00000007 mov dx, word ptr [esp] 0x0000000b jmp 00007FE5150D1432h 0x0000000d inc ebp 0x0000000e rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CCEDC6E second address: 000000006CCECE3D instructions: 0x00000000 rdtsc 0x00000002 and cx, si 0x00000005 jnc 00007FE5151CE63Eh 0x00000007 jmp 00007FE5151CE5FAh 0x00000009 mov dx, word ptr [esp] 0x0000000d jmp 00007FE5151CE638h 0x0000000f sub esp, 02h 0x00000012 jne 00007FE5151CE651h 0x00000014 lea eax, dword ptr [esp+edi] 0x00000017 lea esp, dword ptr [esp+02h] 0x0000001b jmp 00007FE5151CE644h 0x0000001d lea eax, dword ptr [edi+50h] 0x00000020 xchg dx, cx 0x00000023 stc 0x00000024 jc 00007FE5151CE598h 0x00000026 push di 0x00000028 lea esp, dword ptr [esp+02h] 0x0000002c jmp 00007FE5151CE686h 0x0000002e cmp esi, eax 0x00000030 jmp 00007FE5151CE74Bh 0x00000035 jl 00007FE5151CE4DBh 0x0000003b jnl 00007FE5151CE4D5h 0x00000041 ja 00007FE5151CD721h 0x00000047 movzx ecx, byte ptr [ebp+00h] 0x0000004b jmp 00007FE5151CE5EFh 0x0000004d rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CCFDBDC second address: 000000006CCFDDC5 instructions: 0x00000000 rdtsc 0x00000002 push ebp 0x00000003 stc 0x00000004 jnc 00007FE5150D13C2h 0x00000006 shl bp, cl 0x00000009 jmp 00007FE5150D14A1h 0x0000000e push esi 0x0000000f xchg bp, ax 0x00000012 pushfd 0x00000013 jmp 00007FE5150D13B7h 0x00000015 inc bp 0x00000017 jnc 00007FE5150D13DAh 0x00000019 jc 00007FE5150D13D8h 0x0000001b push edi 0x0000001c xchg dh, dl 0x0000001e xchg dl, cl 0x00000020 jmp 00007FE5150D13E5h 0x00000022 sub esp, 00000000h 0x00000025 jbe 00007FE5150D141Ah 0x00000027 mov ecx, dword ptr [esp] 0x0000002a lea edx, dword ptr [esi+esi] 0x0000002d add dx, bx 0x00000030 jmp 00007FE5150D144Bh 0x00000032 pop ebp 0x00000033 sub esp, 03h 0x00000036 jbe 00007FE5150D13E3h 0x00000038 rol esi, cl 0x0000003a add esp, 01h 0x0000003d lea esp, dword ptr [esp+02h] 0x00000041 jmp 00007FE5150D15C9h 0x00000046 add esp, 04h 0x00000049 jno 00007FE5150D1388h 0x0000004b pop edi 0x0000004c rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CCF8B7C second address: 000000006CCF8BB9 instructions: 0x00000000 rdtsc 0x00000002 lea ecx, dword ptr [00000000h+esi*4] 0x00000009 neg cx 0x0000000c jmp 00007FE5151CE63Eh 0x0000000e lea eax, dword ptr [eax+ecx] 0x00000011 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CCF8BB9 second address: 000000006CCF8B0F instructions: 0x00000000 rdtsc 0x00000002 push dword ptr [esp+04h] 0x00000006 retn 0008h 0x00000009 sub ebp, 04h 0x0000000c rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CCF8B0F second address: 000000006CCF8C6A instructions: 0x00000000 rdtsc 0x00000002 xchg dh, ch 0x00000004 jmp 00007FE5151CE7ADh 0x00000009 not eax 0x0000000b not ax 0x0000000e mov edx, edi 0x00000010 mov ecx, dword ptr [edx] 0x00000012 jmp 00007FE5151CE5BFh 0x00000014 mov eax, edx 0x00000016 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CCF8C6A second address: 000000006CCF8C3A instructions: 0x00000000 rdtsc 0x00000002 dec eax 0x00000003 jne 00007FE5150D13CDh 0x00000005 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CCEEAC9 second address: 000000006CCEEEF8 instructions: 0x00000000 rdtsc 0x00000002 mov dl, F2h 0x00000004 bswap ecx 0x00000006 call 00007FE5151CE5EAh 0x0000000b jmp 00007FE5151CE63Bh 0x0000000d lea ebx, dword ptr [ebx+55h] 0x00000010 lea ecx, dword ptr [00000000h+ebx*4] 0x00000017 bsr bp, cx 0x0000001b rcl ecx, 19h 0x0000001e xchg dword ptr [esp+04h], ebx 0x00000022 jmp 00007FE5151CEA6Bh 0x00000027 mov al, F1h 0x00000029 rcl bx, 1 0x0000002c inc bx 0x0000002e sub esp, 1Eh 0x00000031 ror ax, 0002h 0x00000035 lea esp, dword ptr [esp+02h] 0x00000039 jmp 00007FE5151CE5D0h 0x0000003b push dword ptr [esp+20h] 0x0000003f retn 0024h 0x00000042 lea edi, dword ptr [esp+0Ch] 0x00000046 mov dl, byte ptr [esp] 0x00000049 jmp 00007FE5151CEA7Ah 0x0000004e sub esp, 000000B4h 0x00000054 mov ebp, esp 0x00000056 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CCF9089 second address: 000000006CCF907A instructions: 0x00000000 rdtsc 0x00000002 pop eax 0x00000003 lea esi, dword ptr [esi-00000153h] 0x00000009 mov dh, BBh 0x0000000b mov dh, byte ptr [esp] 0x0000000e jmp 00007FE5150D13CFh 0x00000010 mov eax, 75B25F11h 0x00000015 lea edx, dword ptr [00000000h+eax*4] 0x0000001c xchg dword ptr [esp+10h], esi 0x00000020 push edi 0x00000021 mov byte ptr [esp], al 0x00000024 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CD034FB second address: 000000006CD0353D instructions: 0x00000000 rdtsc 0x00000002 push ebp 0x00000003 call 00007FE5150D13E3h 0x00000008 push esp 0x00000009 mov esi, dword ptr [esp+03h] 0x0000000d bswap eax 0x0000000f mov byte ptr [esp+01h], cl 0x00000013 mov word ptr [esp+01h], sp 0x00000018 jmp 00007FE5150D1429h 0x0000001a xchg dword ptr [esp+04h], ebp 0x0000001e pushad 0x0000001f inc cx 0x00000021 bsf di, bx 0x00000025 pop esi 0x00000026 clc 0x00000027 jmp 00007FE5150D13DDh 0x00000029 lea ebp, dword ptr [ebp-0000003Ch] 0x0000002f mov cl, dl 0x00000031 bsr edi, ecx 0x00000034 cmc 0x00000035 cmc 0x00000036 jmp 00007FE5150D144Dh 0x00000038 xchg dword ptr [esp+20h], ebp 0x0000003c inc cl 0x0000003e cmc 0x0000003f setne dh 0x00000042 lea edi, dword ptr [ecx+ebp] 0x00000045 push dword ptr [esp+20h] 0x00000049 retn 0024h 0x0000004c bswap edx 0x0000004e jmp 00007FE5150D1474h 0x00000050 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CCFB85B second address: 000000006CCFB903 instructions: 0x00000000 rdtsc 0x00000002 lea eax, dword ptr [eax+ebx] 0x00000005 jmp 00007FE5151CE5EFh 0x00000007 cmp eax, 9DA45E12h 0x0000000c push si 0x0000000e lea esp, dword ptr [esp+02h] 0x00000012 jmp 00007FE5151CE63Eh 0x00000014 pop esi 0x00000015 mov al, dl 0x00000017 mov al, dl 0x00000019 clc 0x0000001a jnp 00007FE5151CE5F4h 0x0000001c jp 00007FE5151CE686h 0x0000001e pop ebp 0x0000001f mov ch, 2Fh 0x00000021 mov ax, BE00h 0x00000025 or eax, ebx 0x00000027 jnle 00007FE5151CE5D1h 0x00000029 jle 00007FE5151CE5B9h 0x0000002b add esp, 04h 0x0000002e jnbe 00007FE5151CE63Bh 0x00000030 pushfd 0x00000031 mov cx, word ptr [esp+02h] 0x00000036 jmp 00007FE5151CE5F4h 0x00000038 lea edi, dword ptr [ecx+ebx] 0x0000003b mov edi, dword ptr [esp+04h] 0x0000003f mov edx, 6C4C3A78h 0x00000044 push dx 0x00000046 jmp 00007FE5151CE620h 0x00000048 lea esp, dword ptr [esp+02h] 0x0000004c lea esp, dword ptr [esp+08h] 0x00000050 call 00007FE5151CE641h 0x00000055 mov ax, dx 0x00000058 mov cl, B9h 0x0000005a bt dx, bx 0x0000005e xchg dword ptr [esp], ecx 0x00000061 jmp 00007FE5151CE5EEh 0x00000063 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CD0353D second address: 000000006CCECBBE instructions: 0x00000000 rdtsc 0x00000002 lea edx, dword ptr [ecx+000000CFh] 0x00000008 mov cl, ch 0x0000000a mov al, 0Ch 0x0000000c mov esi, eax 0x0000000e sub esp, 0Bh 0x00000011 jmp 00007FE5150D1424h 0x00000013 jle 00007FE5150D1420h 0x00000015 mov al, ah 0x00000017 lea esp, dword ptr [esp+03h] 0x0000001b jmp 00007FE5150D141Eh 0x0000001d jmp 00007FE5150D13E4h 0x0000001f add esp, 08h 0x00000022 jo 00007FE5150D1431h 0x00000024 jno 00007FE5150D142Fh 0x00000026 pop esi 0x00000027 xchg ch, al 0x00000029 pushfd 0x0000002a jmp 00007FE5150D13E6h 0x0000002c mov cl, 90h 0x0000002e bswap edx 0x00000030 jmp 00007FE5150D1418h 0x00000032 add esp, 04h 0x00000035 jmp 00007FE5150D151Eh 0x0000003a jne 00007FE5150D12E8h 0x00000040 pop ebp 0x00000041 mov di, word ptr [esp] 0x00000045 xchg ah, al 0x00000047 mov ah, 7Dh 0x00000049 jmp 00007FE5150D14BCh 0x0000004e bsr ax, bp 0x00000052 jnbe 00007FE5150D138Ch 0x00000054 pop edi 0x00000055 jmp 00007FE5150BA9BCh 0x0000005a mov ebx, ebp 0x0000005c lea eax, dword ptr [esp+ecx] 0x0000005f setle ah 0x00000062 sets dl 0x00000065 call 00007FE5150D13DFh 0x0000006a xchg cl, ch 0x0000006c pushad 0x0000006d rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CCFBA9C second address: 000000006CCECE3D instructions: 0x00000000 rdtsc 0x00000002 mov eax, dword ptr [esp] 0x00000005 jmp 00007FE5150C27B9h 0x0000000a movzx ecx, byte ptr [ebp+00h] 0x0000000e jmp 00007FE5150D13DFh 0x00000010 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CCECCAF second address: 000000006CCECC9D instructions: 0x00000000 rdtsc 0x00000002 neg al 0x00000004 neg al 0x00000006 push sp 0x00000008 jmp 00007FE5151CE5EFh 0x0000000a lea esp, dword ptr [esp+02h] 0x0000000e xchg dword ptr [esp], ebx 0x00000011 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CD01465 second address: 000000006CD0146C instructions: 0x00000000 rdtsc 0x00000002 not ah 0x00000004 ror cl, 00000000h 0x00000007 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CD03196 second address: 000000006CD01849 instructions: 0x00000000 rdtsc 0x00000002 stc 0x00000003 jmp 00007FE5151CE738h 0x00000008 jo 00007FE5151CE4EEh 0x0000000e mov edx, 4C97B051h 0x00000013 neg edx 0x00000015 jmp 00007FE5151CE593h 0x00000017 mov eax, dword ptr [esi] 0x0000001a setnl dh 0x0000001d jmp 00007FE5151CE62Ch 0x0000001f mov dh, cl 0x00000021 call 00007FE5151CE5F4h 0x00000026 sub esi, 04h 0x00000029 mov edx, esi 0x0000002b lea edx, dword ptr [esp+esi] 0x0000002e pushfd 0x0000002f jmp 00007FE5151CE63Eh 0x00000031 btc ecx, ecx 0x00000034 jle 00007FE5151CE5F7h 0x00000036 jnle 00007FE5151CE5F5h 0x00000038 mov dword ptr [esi], eax 0x0000003a lea ecx, dword ptr [ebp+00003F07h] 0x00000040 bts cx, bx 0x00000044 jmp 00007FE5151CE699h 0x00000049 jc 00007FE5151CE598h 0x0000004b xchg dh, cl 0x0000004d mov dx, FA48h 0x00000051 jmp 00007FE5151CCBBCh 0x00000056 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CCECE3D second address: 000000006CCECEB5 instructions: 0x00000000 rdtsc 0x00000002 clc 0x00000003 jnbe 00007FE5150D1436h 0x00000005 not ax 0x00000008 call 00007FE5150D13E7h 0x0000000d mov ax, di 0x00000010 jmp 00007FE5150D141Bh 0x00000012 mov edx, dword ptr [esp] 0x00000015 add esp, 02h 0x00000018 jmp 00007FE5150D145Dh 0x0000001a jnle 00007FE5150D13A9h 0x0000001c mov dl, dh 0x0000001e mov dh, byte ptr [esp+01h] 0x00000022 call 00007FE5150D1439h 0x00000027 lea esp, dword ptr [esp+02h] 0x0000002b jmp 00007FE5150D13E6h 0x0000002d add cl, bl 0x0000002f rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CD01BCB second address: 000000006CD01E93 instructions: 0x00000000 rdtsc 0x00000002 sub esp, 11h 0x00000005 mov word ptr [esp+07h], ax 0x0000000a inc dx 0x0000000c jmp 00007FE5151CE62Dh 0x0000000e lea esp, dword ptr [esp+01h] 0x00000012 lea edi, dword ptr [edi-0000002Bh] 0x00000018 bswap edx 0x0000001a adc edx, ecx 0x0000001c dec dh 0x0000001e setb ah 0x00000021 jmp 00007FE5151CEC5Fh 0x00000026 xchg dword ptr [esp+10h], edi 0x0000002a bsr eax, ecx 0x0000002d sub eax, esi 0x0000002f push dword ptr [esp+10h] 0x00000033 retn 0014h 0x00000036 mov edx, eax 0x00000038 mov eax, ebp 0x0000003a btr eax, ebp 0x0000003d jmp 00007FE5151CEA20h 0x00000042 jl 00007FE5151CE7AAh 0x00000048 mov eax, esi 0x0000004a inc cl 0x0000004c bsr dx, ax 0x00000050 jmp 00007FE5151CE269h 0x00000055 jnp 00007FE5151CE6EEh 0x0000005b mov edx, dword ptr [esp] 0x0000005e xchg eax, edx 0x0000005f jmp 00007FE5151CE4F1h 0x00000064 bsf edx, ebp 0x00000067 jmp 00007FE5151CE807h 0x0000006c pushad 0x0000006d rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CCF9089 second address: 000000006CCF907A instructions: 0x00000000 rdtsc 0x00000002 pop eax 0x00000003 lea esi, dword ptr [esi-00000153h] 0x00000009 mov dh, BBh 0x0000000b mov dh, byte ptr [esp] 0x0000000e jmp 00007FE5151CE5DFh 0x00000010 mov eax, 75B25F11h 0x00000015 lea edx, dword ptr [00000000h+eax*4] 0x0000001c xchg dword ptr [esp+10h], esi 0x00000020 push edi 0x00000021 mov byte ptr [esp], al 0x00000024 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CD0353D second address: 000000006CCECBBE instructions: 0x00000000 rdtsc 0x00000002 lea edx, dword ptr [ecx+000000CFh] 0x00000008 mov cl, ch 0x0000000a mov al, 0Ch 0x0000000c mov esi, eax 0x0000000e sub esp, 0Bh 0x00000011 jmp 00007FE5151CE634h 0x00000013 jle 00007FE5151CE630h 0x00000015 mov al, ah 0x00000017 lea esp, dword ptr [esp+03h] 0x0000001b jmp 00007FE5151CE62Eh 0x0000001d jmp 00007FE5151CE5F4h 0x0000001f add esp, 08h 0x00000022 jo 00007FE5151CE641h 0x00000024 jno 00007FE5151CE63Fh 0x00000026 pop esi 0x00000027 xchg ch, al 0x00000029 pushfd 0x0000002a jmp 00007FE5151CE5F6h 0x0000002c mov cl, 90h 0x0000002e bswap edx 0x00000030 jmp 00007FE5151CE628h 0x00000032 add esp, 04h 0x00000035 jmp 00007FE5151CE72Eh 0x0000003a jne 00007FE5151CE4F8h 0x00000040 pop ebp 0x00000041 mov di, word ptr [esp] 0x00000045 xchg ah, al 0x00000047 mov ah, 7Dh 0x00000049 jmp 00007FE5151CE6CCh 0x0000004e bsr ax, bp 0x00000052 jnbe 00007FE5151CE59Ch 0x00000054 pop edi 0x00000055 jmp 00007FE5151B7BCCh 0x0000005a mov ebx, ebp 0x0000005c lea eax, dword ptr [esp+ecx] 0x0000005f setle ah 0x00000062 sets dl 0x00000065 call 00007FE5151CE5EFh 0x0000006a xchg cl, ch 0x0000006c pushad 0x0000006d rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CD03196 second address: 000000006CD01849 instructions: 0x00000000 rdtsc 0x00000002 stc 0x00000003 jmp 00007FE5150D1528h 0x00000008 jo 00007FE5150D12DEh 0x0000000e mov edx, 4C97B051h 0x00000013 neg edx 0x00000015 jmp 00007FE5150D1383h 0x00000017 mov eax, dword ptr [esi] 0x0000001a setnl dh 0x0000001d jmp 00007FE5150D141Ch 0x0000001f mov dh, cl 0x00000021 call 00007FE5150D13E4h 0x00000026 sub esi, 04h 0x00000029 mov edx, esi 0x0000002b lea edx, dword ptr [esp+esi] 0x0000002e pushfd 0x0000002f jmp 00007FE5150D142Eh 0x00000031 btc ecx, ecx 0x00000034 jle 00007FE5150D13E7h 0x00000036 jnle 00007FE5150D13E5h 0x00000038 mov dword ptr [esi], eax 0x0000003a lea ecx, dword ptr [ebp+00003F07h] 0x00000040 bts cx, bx 0x00000044 jmp 00007FE5150D1489h 0x00000049 jc 00007FE5150D1388h 0x0000004b xchg dh, cl 0x0000004d mov dx, FA48h 0x00000051 jmp 00007FE5150CF9ACh 0x00000056 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CD0345B second address: 000000006CD034FB instructions: 0x00000000 rdtsc 0x00000002 mov ch, bh 0x00000004 stc 0x00000005 mov eax, dword ptr [esp] 0x00000008 jmp 00007FE5150D1419h 0x0000000a mov dl, E0h 0x0000000c push dword ptr [esp+18h] 0x00000010 retn 001Ch 0x00000013 mov edi, dword ptr [ebp+00h] 0x00000016 lea eax, dword ptr [edx+ebx] 0x00000019 setnle cl 0x0000001c mov eax, B0A52D3Ah 0x00000021 jmp 00007FE5150D15E9h 0x00000026 push bx 0x00000028 lea esp, dword ptr [esp+02h] 0x0000002c add ebp, 04h 0x0000002f mov dx, word ptr [esp] 0x00000033 mov ecx, edx 0x00000035 jmp 00007FE5150D1345h 0x0000003a push esi 0x0000003b neg ah 0x0000003d jnle 00007FE5150D13A7h 0x0000003f not ch 0x00000041 cmc 0x00000042 jmp 00007FE5150D1382h 0x00000044 push edi 0x00000045 neg ecx 0x00000047 jne 00007FE5150D13E6h 0x00000049 jmp 00007FE5150D1454h 0x0000004b clc 0x0000004c rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CD0345B second address: 000000006CD034FB instructions: 0x00000000 rdtsc 0x00000002 mov ch, bh 0x00000004 stc 0x00000005 mov eax, dword ptr [esp] 0x00000008 jmp 00007FE5151CE629h 0x0000000a mov dl, E0h 0x0000000c push dword ptr [esp+18h] 0x00000010 retn 001Ch 0x00000013 mov edi, dword ptr [ebp+00h] 0x00000016 lea eax, dword ptr [edx+ebx] 0x00000019 setnle cl 0x0000001c mov eax, B0A52D3Ah 0x00000021 jmp 00007FE5151CE7F9h 0x00000026 push bx 0x00000028 lea esp, dword ptr [esp+02h] 0x0000002c add ebp, 04h 0x0000002f mov dx, word ptr [esp] 0x00000033 mov ecx, edx 0x00000035 jmp 00007FE5151CE555h 0x0000003a push esi 0x0000003b neg ah 0x0000003d jnle 00007FE5151CE5B7h 0x0000003f not ch 0x00000041 cmc 0x00000042 jmp 00007FE5151CE592h 0x00000044 push edi 0x00000045 neg ecx 0x00000047 jne 00007FE5151CE5F6h 0x00000049 jmp 00007FE5151CE664h 0x0000004b clc 0x0000004c rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CCFAD3A second address: 000000006CCECBBE instructions: 0x00000000 rdtsc 0x00000002 lea eax, dword ptr [00000000h+ebx*4] 0x00000009 mov ecx, D5B43DB6h 0x0000000e jmp 00007FE5150C3289h 0x00000013 mov ebx, ebp 0x00000015 lea eax, dword ptr [esp+ecx] 0x00000018 setle ah 0x0000001b sets dl 0x0000001e call 00007FE5150D13DFh 0x00000023 xchg cl, ch 0x00000025 pushad 0x00000026 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CCFAD3A second address: 000000006CCECBBE instructions: 0x00000000 rdtsc 0x00000002 lea eax, dword ptr [00000000h+ebx*4] 0x00000009 mov ecx, D5B43DB6h 0x0000000e jmp 00007FE5151C0499h 0x00000013 mov ebx, ebp 0x00000015 lea eax, dword ptr [esp+ecx] 0x00000018 setle ah 0x0000001b sets dl 0x0000001e call 00007FE5151CE5EFh 0x00000023 xchg cl, ch 0x00000025 pushad 0x00000026 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CD0457D second address: 000000006CD0457F instructions: 0x00000000 rdtsc 0x00000002 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CCFE1D1 second address: 000000006CCFE3D9 instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 xchg word ptr [esp], ax 0x00000007 lea ecx, dword ptr [ecx+esi] 0x0000000a xchg dword ptr [esp+04h], esi 0x0000000e jmp 00007FE5150D1406h 0x00000010 cmc 0x00000011 neg al 0x00000013 dec cx 0x00000015 lea ecx, dword ptr [00000000h+edi*4] 0x0000001c mov eax, 63E4BEA4h 0x00000021 jmp 00007FE5150D15E0h 0x00000026 lea esi, dword ptr [esi+2Ah] 0x00000029 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CD121EC second address: 000000006CD121EE instructions: 0x00000000 rdtsc 0x00000002 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CCFB709 second address: 000000006CCFB85B instructions: 0x00000000 rdtsc 0x00000002 mov ah, byte ptr [esp] 0x00000005 jmp 00007FE5150D141Dh 0x00000007 mov dh, byte ptr [esp] 0x0000000a jmp 00007FE5150D1430h 0x0000000c mov ecx, edi 0x0000000e mov esi, dword ptr [ecx] 0x00000010 bsf ecx, ecx 0x00000013 jnp 00007FE5150D13E3h 0x00000015 jmp 00007FE5150D1495h 0x0000001a mov al, 96h 0x0000001c xchg edx, ecx 0x0000001e add edi, 04h 0x00000021 jmp 00007FE5150D13B9h 0x00000023 btc edx, esi 0x00000026 je 00007FE5150D13E7h 0x00000028 bsr eax, edi 0x0000002b setnl dh 0x0000002e jmp 00007FE5150D141Ch 0x00000030 push ebp 0x00000031 lea ecx, dword ptr [ecx+esi] 0x00000034 call 00007FE5150D13E2h 0x00000039 mov ch, byte ptr [esp] 0x0000003c push esi 0x0000003d jmp 00007FE5150D1482h 0x00000042 and ebp, esi 0x00000044 jns 00007FE5150D13CEh 0x00000046 mov cx, word ptr [esp] 0x0000004a mov cl, byte ptr [esp] 0x0000004d jmp 00007FE5150D13DFh 0x0000004f dec ax 0x00000051 push edi 0x00000052 mov dx, 9280h 0x00000056 mov dx, B8F4h 0x0000005a jmp 00007FE5150D1418h 0x0000005c mov bp, word ptr [esp] 0x00000060 sbb ax, bp 0x00000063 jmp 00007FE5150D1449h 0x00000065 jnc 00007FE5150D13BDh 0x00000067 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CCFB903 second address: 000000006CCECBBE instructions: 0x00000000 rdtsc 0x00000002 sub edx, eax 0x00000004 mov ax, bx 0x00000007 add dx, dx 0x0000000a mov ah, E4h 0x0000000c jmp 00007FE5150D1418h 0x0000000e lea ecx, dword ptr [ecx-0000ED1Ch] 0x00000014 mov dx, AE09h 0x00000018 mov eax, dword ptr [esp] 0x0000001b btc ax, si 0x0000001f call 00007FE5150D16BDh 0x00000024 xchg dword ptr [esp+04h], ecx 0x00000028 mov ch, byte ptr [esp] 0x0000002b jmp 00007FE5150D1233h 0x00000030 sub esp, 16h 0x00000033 mov ax, word ptr [esp+07h] 0x00000038 mov ecx, dword ptr [esp+12h] 0x0000003c add esp, 07h 0x0000003f lea esp, dword ptr [esp+03h] 0x00000043 push dword ptr [esp+10h] 0x00000047 retn 0014h 0x0000004a mov ebx, ebp 0x0000004c lea eax, dword ptr [esp+ecx] 0x0000004f setle ah 0x00000052 sets dl 0x00000055 call 00007FE5150D13DFh 0x0000005a xchg cl, ch 0x0000005c pushad 0x0000005d rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CCECBBE second address: 000000006CCECBE2 instructions: 0x00000000 rdtsc 0x00000002 mov al, bh 0x00000004 xchg dword ptr [esp+20h], esi 0x00000008 jmp 00007FE5151CE62Ch 0x0000000a rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CCECBE2 second address: 000000006CCECCAF instructions: 0x00000000 rdtsc 0x00000002 xchg ecx, edx 0x00000004 mov ax, word ptr [esp] 0x00000008 mov edx, B68AAC39h 0x0000000d lea esi, dword ptr [esi-00000052h] 0x00000013 xchg eax, edx 0x00000014 jmp 00007FE5150D1423h 0x00000016 mov edx, ecx 0x00000018 lea eax, dword ptr [00000000h+edi*4] 0x0000001f mov dx, 208Bh 0x00000023 xchg dword ptr [esp+20h], esi 0x00000027 mov cl, ch 0x00000029 xchg dx, ax 0x0000002c jmp 00007FE5150D13D3h 0x0000002e xchg dx, ax 0x00000031 mov ecx, dword ptr [esp] 0x00000034 push dword ptr [esp+20h] 0x00000038 retn 0024h 0x0000003b mov eax, 12F33EA2h 0x00000040 xor cl, 00000044h 0x00000043 jnl 00007FE5150D14E0h 0x00000049 jl 00007FE5150D14BCh 0x0000004f pushfd 0x00000050 mov dx, cx 0x00000053 mov dh, 56h 0x00000055 jmp 00007FE5150D1471h 0x00000057 lea eax, dword ptr [ebx-03h] 0x0000005a lea ecx, dword ptr [ecx-0F5291AAh] 0x00000060 jmp 00007FE5150D13ADh 0x00000062 lea esp, dword ptr [esp+04h] 0x00000066 sub ebp, 1284C013h 0x0000006c call 00007FE5150D141Ch 0x00000071 mov ecx, dword ptr [esp] 0x00000074 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CCECC9D second address: 000000006CCECCC5 instructions: 0x00000000 rdtsc 0x00000002 mov edx, 93656786h 0x00000007 jmp 00007FE5150D1415h 0x00000009 mov edx, dword ptr [esp] 0x0000000c lea ebx, dword ptr [ebx-00000034h] 0x00000012 shr eax, 0Ch 0x00000015 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CCECE39 second address: 000000006CCECE3D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5151CE5CFh 0x00000004 xor ebp, 2D4823BBh 0x0000000a mov ah, byte ptr [esp] 0x0000000d clc 0x0000000e je 00007FE5151CE5F0h 0x00000010 jne 00007FE5151CE61Ah 0x00000012 mov eax, 09013DC9h 0x00000017 sub esp, 19h 0x0000001a lea esp, dword ptr [esp+01h] 0x0000001e jmp 00007FE5151CE696h 0x00000023 add ebp, dword ptr [esi] 0x00000025 lea eax, dword ptr [00000000h+edx*4] 0x0000002c xchg ch, cl 0x0000002e jmp 00007FE5151CE5BDh 0x00000030 movzx ecx, byte ptr [ebp+00h] 0x00000034 jmp 00007FE5151CE5EFh 0x00000036 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CCED042 second address: 000000006CCED0C7 instructions: 0x00000000 rdtsc 0x00000002 btr eax, ebp 0x00000005 jnp 00007FE5151CE659h 0x00000007 mov dx, word ptr [esp] 0x0000000b jmp 00007FE5151CE642h 0x0000000d inc ebp 0x0000000e rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CCEDC6E second address: 000000006CCECE3D instructions: 0x00000000 rdtsc 0x00000002 and cx, si 0x00000005 jnc 00007FE5150D142Eh 0x00000007 jmp 00007FE5150D13EAh 0x00000009 mov dx, word ptr [esp] 0x0000000d jmp 00007FE5150D1428h 0x0000000f sub esp, 02h 0x00000012 jne 00007FE5150D1441h 0x00000014 lea eax, dword ptr [esp+edi] 0x00000017 lea esp, dword ptr [esp+02h] 0x0000001b jmp 00007FE5150D1434h 0x0000001d lea eax, dword ptr [edi+50h] 0x00000020 xchg dx, cx 0x00000023 stc 0x00000024 jc 00007FE5150D1388h 0x00000026 push di 0x00000028 lea esp, dword ptr [esp+02h] 0x0000002c jmp 00007FE5150D1476h 0x0000002e cmp esi, eax 0x00000030 jmp 00007FE5150D153Bh 0x00000035 jl 00007FE5150D12CBh 0x0000003b jnl 00007FE5150D12C5h 0x00000041 ja 00007FE5150D0511h 0x00000047 movzx ecx, byte ptr [ebp+00h] 0x0000004b jmp 00007FE5150D13DFh 0x0000004d rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CCFDBDC second address: 000000006CCFDDC5 instructions: 0x00000000 rdtsc 0x00000002 push ebp 0x00000003 stc 0x00000004 jnc 00007FE5151CE5D2h 0x00000006 shl bp, cl 0x00000009 jmp 00007FE5151CE6B1h 0x0000000e push esi 0x0000000f xchg bp, ax 0x00000012 pushfd 0x00000013 jmp 00007FE5151CE5C7h 0x00000015 inc bp 0x00000017 jnc 00007FE5151CE5EAh 0x00000019 jc 00007FE5151CE5E8h 0x0000001b push edi 0x0000001c xchg dh, dl 0x0000001e xchg dl, cl 0x00000020 jmp 00007FE5151CE5F5h 0x00000022 sub esp, 00000000h 0x00000025 jbe 00007FE5151CE62Ah 0x00000027 mov ecx, dword ptr [esp] 0x0000002a lea edx, dword ptr [esi+esi] 0x0000002d add dx, bx 0x00000030 jmp 00007FE5151CE65Bh 0x00000032 pop ebp 0x00000033 sub esp, 03h 0x00000036 jbe 00007FE5151CE5F3h 0x00000038 rol esi, cl 0x0000003a add esp, 01h 0x0000003d lea esp, dword ptr [esp+02h] 0x00000041 jmp 00007FE5151CE7D9h 0x00000046 add esp, 04h 0x00000049 jno 00007FE5151CE598h 0x0000004b pop edi 0x0000004c rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CCF8B7C second address: 000000006CCF8BB9 instructions: 0x00000000 rdtsc 0x00000002 lea ecx, dword ptr [00000000h+esi*4] 0x00000009 neg cx 0x0000000c jmp 00007FE5150D142Eh 0x0000000e lea eax, dword ptr [eax+ecx] 0x00000011 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CCF8B0F second address: 000000006CCF8C6A instructions: 0x00000000 rdtsc 0x00000002 xchg dh, ch 0x00000004 jmp 00007FE5150D159Dh 0x00000009 not eax 0x0000000b not ax 0x0000000e mov edx, edi 0x00000010 mov ecx, dword ptr [edx] 0x00000012 jmp 00007FE5150D13AFh 0x00000014 mov eax, edx 0x00000016 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CCF8C6A second address: 000000006CCF8C3A instructions: 0x00000000 rdtsc 0x00000002 dec eax 0x00000003 jne 00007FE5151CE5DDh 0x00000005 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CD034FB second address: 000000006CD0353D instructions: 0x00000000 rdtsc 0x00000002 push ebp 0x00000003 call 00007FE5151CE5F3h 0x00000008 push esp 0x00000009 mov esi, dword ptr [esp+03h] 0x0000000d bswap eax 0x0000000f mov byte ptr [esp+01h], cl 0x00000013 mov word ptr [esp+01h], sp 0x00000018 jmp 00007FE5151CE639h 0x0000001a xchg dword ptr [esp+04h], ebp 0x0000001e pushad 0x0000001f inc cx 0x00000021 bsf di, bx 0x00000025 pop esi 0x00000026 clc 0x00000027 jmp 00007FE5151CE5EDh 0x00000029 lea ebp, dword ptr [ebp-0000003Ch] 0x0000002f mov cl, dl 0x00000031 bsr edi, ecx 0x00000034 cmc 0x00000035 cmc 0x00000036 jmp 00007FE5151CE65Dh 0x00000038 xchg dword ptr [esp+20h], ebp 0x0000003c inc cl 0x0000003e cmc 0x0000003f setne dh 0x00000042 lea edi, dword ptr [ecx+ebp] 0x00000045 push dword ptr [esp+20h] 0x00000049 retn 0024h 0x0000004c bswap edx 0x0000004e jmp 00007FE5151CE684h 0x00000050 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CCFBA9C second address: 000000006CCECE3D instructions: 0x00000000 rdtsc 0x00000002 mov eax, dword ptr [esp] 0x00000005 jmp 00007FE5151BF9C9h 0x0000000a movzx ecx, byte ptr [ebp+00h] 0x0000000e jmp 00007FE5151CE5EFh 0x00000010 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CD01BCB second address: 000000006CD01E93 instructions: 0x00000000 rdtsc 0x00000002 sub esp, 11h 0x00000005 mov word ptr [esp+07h], ax 0x0000000a inc dx 0x0000000c jmp 00007FE5150D141Dh 0x0000000e lea esp, dword ptr [esp+01h] 0x00000012 lea edi, dword ptr [edi-0000002Bh] 0x00000018 bswap edx 0x0000001a adc edx, ecx 0x0000001c dec dh 0x0000001e setb ah 0x00000021 jmp 00007FE5150D1A4Fh 0x00000026 xchg dword ptr [esp+10h], edi 0x0000002a bsr eax, ecx 0x0000002d sub eax, esi 0x0000002f push dword ptr [esp+10h] 0x00000033 retn 0014h 0x00000036 mov edx, eax 0x00000038 mov eax, ebp 0x0000003a btr eax, ebp 0x0000003d jmp 00007FE5150D1810h 0x00000042 jl 00007FE5150D159Ah 0x00000048 mov eax, esi 0x0000004a inc cl 0x0000004c bsr dx, ax 0x00000050 jmp 00007FE5150D1059h 0x00000055 jnp 00007FE5150D14DEh 0x0000005b mov edx, dword ptr [esp] 0x0000005e xchg eax, edx 0x0000005f jmp 00007FE5150D12E1h 0x00000064 bsf edx, ebp 0x00000067 jmp 00007FE5150D15F7h 0x0000006c pushad 0x0000006d rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CCEA7C8 second address: 000000006CCEA807 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5151CE5ECh 0x00000004 sub esp, 000000A0h 0x0000000a call 00007FE5151CE665h 0x0000000f setno bl 0x00000012 mov al, byte ptr [esp] 0x00000015 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CD039C4 second address: 000000006CD039F9 instructions: 0x00000000 rdtsc 0x00000002 lea esp, dword ptr [esp+02h] 0x00000006 jmp 00007FE5150D13D5h 0x00000008 lea ebp, dword ptr [ebp-00000520h] 0x0000000e xchg eax, edx 0x0000000f lea eax, dword ptr [00000000h+ecx*4] 0x00000016 jmp 00007FE5150D143Ch 0x00000018 mov dx, bp 0x0000001b lea eax, dword ptr [edi+ebp] 0x0000001e not eax 0x00000020 xchg dword ptr [esp+3Ch], ebp 0x00000024 bsf dx, di 0x00000028 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CCFE1D1 second address: 000000006CCFE3D9 instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 xchg word ptr [esp], ax 0x00000007 lea ecx, dword ptr [ecx+esi] 0x0000000a xchg dword ptr [esp+04h], esi 0x0000000e jmp 00007FE5151CE616h 0x00000010 cmc 0x00000011 neg al 0x00000013 dec cx 0x00000015 lea ecx, dword ptr [00000000h+edi*4] 0x0000001c mov eax, 63E4BEA4h 0x00000021 jmp 00007FE5151CE7F0h 0x00000026 lea esi, dword ptr [esi+2Ah] 0x00000029 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CCEA7C8 second address: 000000006CCEA807 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5150D13DCh 0x00000004 sub esp, 000000A0h 0x0000000a call 00007FE5150D1455h 0x0000000f setno bl 0x00000012 mov al, byte ptr [esp] 0x00000015 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CD039C4 second address: 000000006CD039F9 instructions: 0x00000000 rdtsc 0x00000002 lea esp, dword ptr [esp+02h] 0x00000006 jmp 00007FE5151CE5E5h 0x00000008 lea ebp, dword ptr [ebp-00000520h] 0x0000000e xchg eax, edx 0x0000000f lea eax, dword ptr [00000000h+ecx*4] 0x00000016 jmp 00007FE5151CE64Ch 0x00000018 mov dx, bp 0x0000001b lea eax, dword ptr [edi+ebp] 0x0000001e not eax 0x00000020 xchg dword ptr [esp+3Ch], ebp 0x00000024 bsf dx, di 0x00000028 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CD3A396 second address: 000000006CD3A359 instructions: 0x00000000 rdtsc 0x00000002 bswap ecx 0x00000004 mov dh, byte ptr [esp] 0x00000007 jmp 00007FE5151CE4E8h 0x0000000c add esi, 02h 0x0000000f btr cx, ax 0x00000013 jno 00007FE5151CE6EDh 0x00000019 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CD3A359 second address: 000000006CD3A2DB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5150D1351h 0x00000007 not cl 0x00000009 call 00007FE5150D144Dh 0x0000000e lea edx, dword ptr [00000000h+esi*4] 0x00000015 mov cx, E8B9h 0x00000019 rcl dx, cl 0x0000001c btc cx, ax 0x00000020 xchg al, cl 0x00000022 jmp 00007FE5150D13C9h 0x00000024 xchg dword ptr [esp], edi 0x00000027 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CD3A2DB second address: 000000006CD3A2D0 instructions: 0x00000000 rdtsc 0x00000002 btc eax, ebx 0x00000005 mov eax, edx 0x00000007 xchg ch, ah 0x00000009 lea edi, dword ptr [edi-0004D459h] 0x0000000f jmp 00007FE5151CE5E8h 0x00000011 mov eax, edi 0x00000013 mov dx, EA8Dh 0x00000017 lea ecx, dword ptr [ebx+52h] 0x0000001a xchg dword ptr [esp], edi 0x0000001d bswap edx 0x0000001f rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CD3A2D0 second address: 000000006CCECE3D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5150D1455h 0x00000004 push dword ptr [esp] 0x00000007 retn 0004h 0x0000000a movzx ecx, byte ptr [ebp+00h] 0x0000000e jmp 00007FE5150D13DFh 0x00000010 rdtsc |
Source: C:\Windows\System32\loaddll32.exe | RDTSC instruction interceptor: First address: 000000006CCEEAC9 second address: 000000006CCEEEF8 instructions: 0x00000000 rdtsc 0x00000002 mov dl, F2h 0x00000004 bswap ecx 0x00000006 call 00007FE5150D13DAh 0x0000000b jmp 00007FE5150D142Bh 0x0000000d lea ebx, dword ptr [ebx+55h] 0x00000010 lea ecx, dword ptr [00000000h+ebx*4] 0x00000017 bsr bp, cx 0x0000001b rcl ecx, 19h 0x0000001e xchg dword ptr [esp+04h], ebx 0x00000022 jmp 00007FE5150D185Bh 0x00000027 mov al, F1h 0x00000029 rcl bx, 1 0x0000002c inc bx 0x0000002e sub esp, 1Eh 0x00000031 ror ax, 0002h 0x00000035 lea esp, dword ptr [esp+02h] 0x00000039 jmp 00007FE5150D13C0h 0x0000003b push dword ptr [esp+20h] 0x0000003f retn 0024h 0x00000042 lea edi, dword ptr [esp+0Ch] 0x00000046 mov dl, byte ptr [esp] 0x00000049 jmp 00007FE5150D186Ah 0x0000004e sub esp, 000000B4h 0x00000054 mov ebp, esp 0x00000056 rdtsc |
Source: C:\Windows\System32\loaddll32.exe | RDTSC instruction interceptor: First address: 000000006CCFB709 second address: 000000006CCFB85B instructions: 0x00000000 rdtsc 0x00000002 mov ah, byte ptr [esp] 0x00000005 jmp 00007FE5151CE62Dh 0x00000007 mov dh, byte ptr [esp] 0x0000000a jmp 00007FE5151CE640h 0x0000000c mov ecx, edi 0x0000000e mov esi, dword ptr [ecx] 0x00000010 bsf ecx, ecx 0x00000013 jnp 00007FE5151CE5F3h 0x00000015 jmp 00007FE5151CE6A5h 0x0000001a mov al, 96h 0x0000001c xchg edx, ecx 0x0000001e add edi, 04h 0x00000021 jmp 00007FE5151CE5C9h 0x00000023 btc edx, esi 0x00000026 je 00007FE5151CE5F7h 0x00000028 bsr eax, edi 0x0000002b setnl dh 0x0000002e jmp 00007FE5151CE62Ch 0x00000030 push ebp 0x00000031 lea ecx, dword ptr [ecx+esi] 0x00000034 call 00007FE5151CE5F2h 0x00000039 mov ch, byte ptr [esp] 0x0000003c push esi 0x0000003d jmp 00007FE5151CE692h 0x00000042 and ebp, esi 0x00000044 jns 00007FE5151CE5DEh 0x00000046 mov cx, word ptr [esp] 0x0000004a mov cl, byte ptr [esp] 0x0000004d jmp 00007FE5151CE5EFh 0x0000004f dec ax 0x00000051 push edi 0x00000052 mov dx, 9280h 0x00000056 mov dx, B8F4h 0x0000005a jmp 00007FE5151CE628h 0x0000005c mov bp, word ptr [esp] 0x00000060 sbb ax, bp 0x00000063 jmp 00007FE5151CE659h 0x00000065 jnc 00007FE5151CE5CDh 0x00000067 rdtsc |
Source: C:\Windows\System32\loaddll32.exe | RDTSC instruction interceptor: First address: 000000006CCFB85B second address: 000000006CCFB903 instructions: 0x00000000 rdtsc 0x00000002 lea eax, dword ptr [eax+ebx] 0x00000005 jmp 00007FE5150D13DFh 0x00000007 cmp eax, 9DA45E12h 0x0000000c push si 0x0000000e lea esp, dword ptr [esp+02h] 0x00000012 jmp 00007FE5150D142Eh 0x00000014 pop esi 0x00000015 mov al, dl 0x00000017 mov al, dl 0x00000019 clc 0x0000001a jnp 00007FE5150D13E4h 0x0000001c jp 00007FE5150D1476h 0x0000001e pop ebp 0x0000001f mov ch, 2Fh 0x00000021 mov ax, BE00h 0x00000025 or eax, ebx 0x00000027 jnle 00007FE5150D13C1h 0x00000029 jle 00007FE5150D13A9h 0x0000002b add esp, 04h 0x0000002e jnbe 00007FE5150D142Bh 0x00000030 pushfd 0x00000031 mov cx, word ptr [esp+02h] 0x00000036 jmp 00007FE5150D13E4h 0x00000038 lea edi, dword ptr [ecx+ebx] 0x0000003b mov edi, dword ptr [esp+04h] 0x0000003f mov edx, 6C4C3A78h 0x00000044 push dx 0x00000046 jmp 00007FE5150D1410h 0x00000048 lea esp, dword ptr [esp+02h] 0x0000004c lea esp, dword ptr [esp+08h] 0x00000050 call 00007FE5150D1431h 0x00000055 mov ax, dx 0x00000058 mov cl, B9h 0x0000005a bt dx, bx 0x0000005e xchg dword ptr [esp], ecx 0x00000061 jmp 00007FE5150D13DEh 0x00000063 rdtsc |
Source: C:\Windows\System32\loaddll32.exe | RDTSC instruction interceptor: First address: 000000006CCFB903 second address: 000000006CCECBBE instructions: 0x00000000 rdtsc 0x00000002 sub edx, eax 0x00000004 mov ax, bx 0x00000007 add dx, dx 0x0000000a mov ah, E4h 0x0000000c jmp 00007FE5151CE628h 0x0000000e lea ecx, dword ptr [ecx-0000ED1Ch] 0x00000014 mov dx, AE09h 0x00000018 mov eax, dword ptr [esp] 0x0000001b btc ax, si 0x0000001f call 00007FE5151CE8CDh 0x00000024 xchg dword ptr [esp+04h], ecx 0x00000028 mov ch, byte ptr [esp] 0x0000002b jmp 00007FE5151CE443h 0x00000030 sub esp, 16h 0x00000033 mov ax, word ptr [esp+07h] 0x00000038 mov ecx, dword ptr [esp+12h] 0x0000003c add esp, 07h 0x0000003f lea esp, dword ptr [esp+03h] 0x00000043 push dword ptr [esp+10h] 0x00000047 retn 0014h 0x0000004a mov ebx, ebp 0x0000004c lea eax, dword ptr [esp+ecx] 0x0000004f setle ah 0x00000052 sets dl 0x00000055 call 00007FE5151CE5EFh 0x0000005a xchg cl, ch 0x0000005c pushad 0x0000005d rdtsc |
Source: C:\Windows\System32\loaddll32.exe | RDTSC instruction interceptor: First address: 000000006CCECBBE second address: 000000006CCECBE2 instructions: 0x00000000 rdtsc 0x00000002 mov al, bh 0x00000004 xchg dword ptr [esp+20h], esi 0x00000008 jmp 00007FE5150D141Ch 0x0000000a rdtsc |
Source: C:\Windows\System32\loaddll32.exe | RDTSC instruction interceptor: First address: 000000006CCECBE2 second address: 000000006CCECCAF instructions: 0x00000000 rdtsc 0x00000002 xchg ecx, edx 0x00000004 mov ax, word ptr [esp] 0x00000008 mov edx, B68AAC39h 0x0000000d lea esi, dword ptr [esi-00000052h] 0x00000013 xchg eax, edx 0x00000014 jmp 00007FE5151CE633h 0x00000016 mov edx, ecx 0x00000018 lea eax, dword ptr [00000000h+edi*4] 0x0000001f mov dx, 208Bh 0x00000023 xchg dword ptr [esp+20h], esi 0x00000027 mov cl, ch 0x00000029 xchg dx, ax 0x0000002c jmp 00007FE5151CE5E3h 0x0000002e xchg dx, ax 0x00000031 mov ecx, dword ptr [esp] 0x00000034 push dword ptr [esp+20h] 0x00000038 retn 0024h 0x0000003b mov eax, 12F33EA2h 0x00000040 xor cl, 00000044h 0x00000043 jnl 00007FE5151CE6F0h 0x00000049 pushfd 0x0000004a mov dx, cx 0x0000004d mov dh, 56h 0x0000004f lea eax, dword ptr [ebx-03h] 0x00000052 lea ecx, dword ptr [ecx-0F5291AAh] 0x00000058 lea esp, dword ptr [esp+04h] 0x0000005c sub ebp, 1284C013h 0x00000062 call 00007FE5151CE62Ch 0x00000067 mov ecx, dword ptr [esp] 0x0000006a rdtsc |
Source: C:\Windows\System32\loaddll32.exe | RDTSC instruction interceptor: First address: 000000006CCECCAF second address: 000000006CCECC9D instructions: 0x00000000 rdtsc 0x00000002 neg al 0x00000004 neg al 0x00000006 push sp 0x00000008 jmp 00007FE5150D13DFh 0x0000000a lea esp, dword ptr [esp+02h] 0x0000000e xchg dword ptr [esp], ebx 0x00000011 rdtsc |
Source: C:\Windows\System32\loaddll32.exe | RDTSC instruction interceptor: First address: 000000006CCECC9D second address: 000000006CCECCC5 instructions: 0x00000000 rdtsc 0x00000002 mov edx, 93656786h 0x00000007 jmp 00007FE5151CE625h 0x00000009 mov edx, dword ptr [esp] 0x0000000c lea ebx, dword ptr [ebx-00000034h] 0x00000012 shr eax, 0Ch 0x00000015 rdtsc |
Source: C:\Windows\System32\loaddll32.exe | RDTSC instruction interceptor: First address: 000000006CCECE39 second address: 000000006CCECE3D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5150D13BFh 0x00000004 xor ebp, 2D4823BBh 0x0000000a mov ah, byte ptr [esp] 0x0000000d clc 0x0000000e je 00007FE5150D13E0h 0x00000010 jne 00007FE5150D140Ah 0x00000012 mov eax, 09013DC9h 0x00000017 sub esp, 19h 0x0000001a lea esp, dword ptr [esp+01h] 0x0000001e jmp 00007FE5150D1486h 0x00000023 add ebp, dword ptr [esi] 0x00000025 lea eax, dword ptr [00000000h+edx*4] 0x0000002c xchg ch, cl 0x0000002e jmp 00007FE5150D13ADh 0x00000030 movzx ecx, byte ptr [ebp+00h] 0x00000034 jmp 00007FE5150D13DFh 0x00000036 rdtsc |
Source: C:\Windows\System32\loaddll32.exe | RDTSC instruction interceptor: First address: 000000006CCECE3D second address: 000000006CCECEB5 instructions: 0x00000000 rdtsc 0x00000002 clc 0x00000003 jnbe 00007FE5151CE646h 0x00000005 not ax 0x00000008 call 00007FE5151CE5F7h 0x0000000d mov ax, di 0x00000010 jmp 00007FE5151CE62Bh 0x00000012 mov edx, dword ptr [esp] 0x00000015 add esp, 02h 0x00000018 jmp 00007FE5151CE66Dh 0x0000001a jnle 00007FE5151CE5B9h 0x0000001c mov dl, dh 0x0000001e mov dh, byte ptr [esp+01h] 0x00000022 call 00007FE5151CE649h 0x00000027 lea esp, dword ptr [esp+02h] 0x0000002b jmp 00007FE5151CE5F6h 0x0000002d add cl, bl 0x0000002f rdtsc |
Source: C:\Windows\System32\loaddll32.exe | RDTSC instruction interceptor: First address: 000000006CCED042 second address: 000000006CCED0C7 instructions: 0x00000000 rdtsc 0x00000002 btr eax, ebp 0x00000005 jnp 00007FE5150D1449h 0x00000007 mov dx, word ptr [esp] 0x0000000b jmp 00007FE5150D1432h 0x0000000d inc ebp 0x0000000e rdtsc |
Source: C:\Windows\System32\loaddll32.exe | RDTSC instruction interceptor: First address: 000000006CCEDC6E second address: 000000006CCECE3D instructions: 0x00000000 rdtsc 0x00000002 and cx, si 0x00000005 jnc 00007FE5151CE63Eh 0x00000007 jmp 00007FE5151CE5FAh 0x00000009 mov dx, word ptr [esp] 0x0000000d jmp 00007FE5151CE638h 0x0000000f sub esp, 02h 0x00000012 jne 00007FE5151CE651h 0x00000014 lea eax, dword ptr [esp+edi] 0x00000017 lea esp, dword ptr [esp+02h] 0x0000001b jmp 00007FE5151CE644h 0x0000001d lea eax, dword ptr [edi+50h] 0x00000020 xchg dx, cx 0x00000023 stc 0x00000024 jc 00007FE5151CE598h 0x00000026 push di 0x00000028 lea esp, dword ptr [esp+02h] 0x0000002c jmp 00007FE5151CE686h 0x0000002e cmp esi, eax 0x00000030 jmp 00007FE5151CE74Bh 0x00000035 jl 00007FE5151CE4DBh 0x0000003b jnl 00007FE5151CE4D5h 0x00000041 ja 00007FE5151CD721h 0x00000047 movzx ecx, byte ptr [ebp+00h] 0x0000004b jmp 00007FE5151CE5EFh 0x0000004d rdtsc |
Source: C:\Windows\System32\loaddll32.exe | RDTSC instruction interceptor: First address: 000000006CCFDBDC second address: 000000006CCFDDC5 instructions: 0x00000000 rdtsc 0x00000002 push ebp 0x00000003 stc 0x00000004 jnc 00007FE5150D13C2h 0x00000006 shl bp, cl 0x00000009 jmp 00007FE5150D14A1h 0x0000000e push esi 0x0000000f xchg bp, ax 0x00000012 pushfd 0x00000013 jmp 00007FE5150D13B7h 0x00000015 inc bp 0x00000017 jnc 00007FE5150D13DAh 0x00000019 jc 00007FE5150D13D8h 0x0000001b push edi 0x0000001c xchg dh, dl 0x0000001e xchg dl, cl 0x00000020 jmp 00007FE5150D13E5h 0x00000022 sub esp, 00000000h 0x00000025 jbe 00007FE5150D141Ah 0x00000027 mov ecx, dword ptr [esp] 0x0000002a lea edx, dword ptr [esi+esi] 0x0000002d add dx, bx 0x00000030 jmp 00007FE5150D144Bh 0x00000032 pop ebp 0x00000033 sub esp, 03h 0x00000036 jbe 00007FE5150D13E3h 0x00000038 rol esi, cl 0x0000003a add esp, 01h 0x0000003d lea esp, dword ptr [esp+02h] 0x00000041 jmp 00007FE5150D15C9h 0x00000046 add esp, 04h 0x00000049 jno 00007FE5150D1388h 0x0000004b pop edi 0x0000004c rdtsc |
Source: C:\Windows\System32\loaddll32.exe | RDTSC instruction interceptor: First address: 000000006CCF8B7C second address: 000000006CCF8BB9 instructions: 0x00000000 rdtsc 0x00000002 lea ecx, dword ptr [00000000h+esi*4] 0x00000009 neg cx 0x0000000c jmp 00007FE5151CE63Eh 0x0000000e lea eax, dword ptr [eax+ecx] 0x00000011 rdtsc |
Source: C:\Windows\System32\loaddll32.exe | RDTSC instruction interceptor: First address: 000000006CCF8BB9 second address: 000000006CCF8B0F instructions: 0x00000000 rdtsc 0x00000002 push dword ptr [esp+04h] 0x00000006 retn 0008h 0x00000009 sub ebp, 04h 0x0000000c rdtsc |
Source: C:\Windows\System32\loaddll32.exe | RDTSC instruction interceptor: First address: 000000006CCF8B0F second address: 000000006CCF8C6A instructions: 0x00000000 rdtsc 0x00000002 xchg dh, ch 0x00000004 jmp 00007FE5151CE7ADh 0x00000009 not eax 0x0000000b not ax 0x0000000e mov edx, edi 0x00000010 mov ecx, dword ptr [edx] 0x00000012 jmp 00007FE5151CE5BFh 0x00000014 mov eax, edx 0x00000016 rdtsc |
Source: C:\Windows\System32\loaddll32.exe | RDTSC instruction interceptor: First address: 000000006CCF8C6A second address: 000000006CCF8C3A instructions: 0x00000000 rdtsc 0x00000002 dec eax 0x00000003 jne 00007FE5150D13CDh 0x00000005 rdtsc |
Source: C:\Windows\System32\loaddll32.exe | RDTSC instruction interceptor: First address: 000000006CCF9089 second address: 000000006CCF907A instructions: 0x00000000 rdtsc 0x00000002 pop eax 0x00000003 lea esi, dword ptr [esi-00000153h] 0x00000009 mov dh, BBh 0x0000000b mov dh, byte ptr [esp] 0x0000000e jmp 00007FE5151CE5DFh 0x00000010 mov eax, 75B25F11h 0x00000015 lea edx, dword ptr [00000000h+eax*4] 0x0000001c xchg dword ptr [esp+10h], esi 0x00000020 push edi 0x00000021 mov byte ptr [esp], al 0x00000024 rdtsc |
Source: C:\Windows\System32\loaddll32.exe | RDTSC instruction interceptor: First address: 000000006CD034FB second address: 000000006CD0353D instructions: 0x00000000 rdtsc 0x00000002 push ebp 0x00000003 call 00007FE5150D13E3h 0x00000008 push esp 0x00000009 mov esi, dword ptr [esp+03h] 0x0000000d bswap eax 0x0000000f mov byte ptr [esp+01h], cl 0x00000013 mov word ptr [esp+01h], sp 0x00000018 jmp 00007FE5150D1429h 0x0000001a xchg dword ptr [esp+04h], ebp 0x0000001e pushad 0x0000001f inc cx 0x00000021 bsf di, bx 0x00000025 pop esi 0x00000026 clc 0x00000027 jmp 00007FE5150D13DDh 0x00000029 lea ebp, dword ptr [ebp-0000003Ch] 0x0000002f mov cl, dl 0x00000031 bsr edi, ecx 0x00000034 cmc 0x00000035 cmc 0x00000036 jmp 00007FE5150D144Dh 0x00000038 xchg dword ptr [esp+20h], ebp 0x0000003c inc cl 0x0000003e cmc 0x0000003f setne dh 0x00000042 lea edi, dword ptr [ecx+ebp] 0x00000045 push dword ptr [esp+20h] 0x00000049 retn 0024h 0x0000004c bswap edx 0x0000004e jmp 00007FE5150D1474h 0x00000050 rdtsc |
Source: C:\Windows\System32\loaddll32.exe | RDTSC instruction interceptor: First address: 000000006CD0353D second address: 000000006CCECBBE instructions: 0x00000000 rdtsc 0x00000002 lea edx, dword ptr [ecx+000000CFh] 0x00000008 mov cl, ch 0x0000000a mov al, 0Ch 0x0000000c mov esi, eax 0x0000000e sub esp, 0Bh 0x00000011 jmp 00007FE5151CE634h 0x00000013 jle 00007FE5151CE630h 0x00000015 mov al, ah 0x00000017 lea esp, dword ptr [esp+03h] 0x0000001b jmp 00007FE5151CE62Eh 0x0000001d jmp 00007FE5151CE5F4h 0x0000001f add esp, 08h 0x00000022 jo 00007FE5151CE641h 0x00000024 jno 00007FE5151CE63Fh 0x00000026 pop esi 0x00000027 xchg ch, al 0x00000029 pushfd 0x0000002a jmp 00007FE5151CE5F6h 0x0000002c mov cl, 90h 0x0000002e bswap edx 0x00000030 jmp 00007FE5151CE628h 0x00000032 add esp, 04h 0x00000035 jmp 00007FE5151CE72Eh 0x0000003a jne 00007FE5151CE4F8h 0x00000040 pop ebp 0x00000041 mov di, word ptr [esp] 0x00000045 xchg ah, al 0x00000047 mov ah, 7Dh 0x00000049 jmp 00007FE5151CE6CCh 0x0000004e bsr ax, bp 0x00000052 jnbe 00007FE5151CE59Ch 0x00000054 pop edi 0x00000055 jmp 00007FE5151B7BCCh 0x0000005a mov ebx, ebp 0x0000005c lea eax, dword ptr [esp+ecx] 0x0000005f setle ah 0x00000062 sets dl 0x00000065 call 00007FE5151CE5EFh 0x0000006a xchg cl, ch 0x0000006c pushad 0x0000006d rdtsc |
Source: C:\Windows\System32\loaddll32.exe | RDTSC instruction interceptor: First address: 000000006CCFBA9C second address: 000000006CCECE3D instructions: 0x00000000 rdtsc 0x00000002 mov eax, dword ptr [esp] 0x00000005 jmp 00007FE5150C27B9h 0x0000000a movzx ecx, byte ptr [ebp+00h] 0x0000000e jmp 00007FE5150D13DFh 0x00000010 rdtsc |
Source: C:\Windows\System32\loaddll32.exe | RDTSC instruction interceptor: First address: 000000006CD01465 second address: 000000006CD0146C instructions: 0x00000000 rdtsc 0x00000002 not ah 0x00000004 ror cl, 00000000h 0x00000007 rdtsc |
Source: C:\Windows\System32\loaddll32.exe | RDTSC instruction interceptor: First address: 000000006CD03196 second address: 000000006CD01849 instructions: 0x00000000 rdtsc 0x00000002 stc 0x00000003 jmp 00007FE5150D1528h 0x00000008 jo 00007FE5150D12DEh 0x0000000e mov edx, 4C97B051h 0x00000013 neg edx 0x00000015 jmp 00007FE5150D1383h 0x00000017 mov eax, dword ptr [esi] 0x0000001a setnl dh 0x0000001d jmp 00007FE5150D141Ch 0x0000001f mov dh, cl 0x00000021 call 00007FE5150D13E4h 0x00000026 sub esi, 04h 0x00000029 mov edx, esi 0x0000002b lea edx, dword ptr [esp+esi] 0x0000002e pushfd 0x0000002f jmp 00007FE5150D142Eh 0x00000031 btc ecx, ecx 0x00000034 jle 00007FE5150D13E7h 0x00000036 jnle 00007FE5150D13E5h 0x00000038 mov dword ptr [esi], eax 0x0000003a lea ecx, dword ptr [ebp+00003F07h] 0x00000040 bts cx, bx 0x00000044 jmp 00007FE5150D1489h 0x00000049 jc 00007FE5150D1388h 0x0000004b xchg dh, cl 0x0000004d mov dx, FA48h 0x00000051 jmp 00007FE5150CF9ACh 0x00000056 rdtsc |
Source: C:\Windows\System32\loaddll32.exe | RDTSC instruction interceptor: First address: 000000006CD01BCB second address: 000000006CD01E93 instructions: 0x00000000 rdtsc 0x00000002 sub esp, 11h 0x00000005 mov word ptr [esp+07h], ax 0x0000000a inc dx 0x0000000c jmp 00007FE5151CE62Dh 0x0000000e lea esp, dword ptr [esp+01h] 0x00000012 lea edi, dword ptr [edi-0000002Bh] 0x00000018 bswap edx 0x0000001a adc edx, ecx 0x0000001c dec dh 0x0000001e setb ah 0x00000021 jmp 00007FE5151CEC5Fh 0x00000026 xchg dword ptr [esp+10h], edi 0x0000002a bsr eax, ecx 0x0000002d sub eax, esi 0x0000002f push dword ptr [esp+10h] 0x00000033 retn 0014h 0x00000036 mov edx, eax 0x00000038 mov eax, ebp 0x0000003a btr eax, ebp 0x0000003d jmp 00007FE5151CEA20h 0x00000042 jl 00007FE5151CE7AAh 0x00000048 mov eax, esi 0x0000004a inc cl 0x0000004c bsr dx, ax 0x00000050 jmp 00007FE5151CE269h 0x00000055 jnp 00007FE5151CE6EEh 0x0000005b mov edx, dword ptr [esp] 0x0000005e xchg eax, edx 0x0000005f jmp 00007FE5151CE4F1h 0x00000064 bsf edx, ebp 0x00000067 jmp 00007FE5151CE807h 0x0000006c pushad 0x0000006d rdtsc |
Source: C:\Windows\System32\loaddll32.exe | RDTSC instruction interceptor: First address: 000000006CD0345B second address: 000000006CD034FB instructions: 0x00000000 rdtsc 0x00000002 mov ch, bh 0x00000004 stc 0x00000005 mov eax, dword ptr [esp] 0x00000008 jmp 00007FE5151CE629h 0x0000000a mov dl, E0h 0x0000000c push dword ptr [esp+18h] 0x00000010 retn 001Ch 0x00000013 mov edi, dword ptr [ebp+00h] 0x00000016 lea eax, dword ptr [edx+ebx] 0x00000019 setnle cl 0x0000001c mov eax, B0A52D3Ah 0x00000021 jmp 00007FE5151CE7F9h 0x00000026 push bx 0x00000028 lea esp, dword ptr [esp+02h] 0x0000002c add ebp, 04h 0x0000002f mov dx, word ptr [esp] 0x00000033 mov ecx, edx 0x00000035 jmp 00007FE5151CE555h 0x0000003a push esi 0x0000003b neg ah 0x0000003d jnle 00007FE5151CE5B7h 0x0000003f not ch 0x00000041 cmc 0x00000042 jmp 00007FE5151CE592h 0x00000044 push edi 0x00000045 neg ecx 0x00000047 jne 00007FE5151CE5F6h 0x00000049 jmp 00007FE5151CE664h 0x0000004b clc 0x0000004c rdtsc |
Source: C:\Windows\System32\loaddll32.exe | RDTSC instruction interceptor: First address: 000000006CCFAD3A second address: 000000006CCECBBE instructions: 0x00000000 rdtsc 0x00000002 lea eax, dword ptr [00000000h+ebx*4] 0x00000009 mov ecx, D5B43DB6h 0x0000000e jmp 00007FE5150C3289h 0x00000013 mov ebx, ebp 0x00000015 lea eax, dword ptr [esp+ecx] 0x00000018 setle ah 0x0000001b sets dl 0x0000001e call 00007FE5150D13DFh 0x00000023 xchg cl, ch 0x00000025 pushad 0x00000026 rdtsc |
Source: C:\Windows\System32\loaddll32.exe | RDTSC instruction interceptor: First address: 000000006CD0457D second address: 000000006CD0457F instructions: 0x00000000 rdtsc 0x00000002 rdtsc |
Source: C:\Windows\System32\loaddll32.exe | RDTSC instruction interceptor: First address: 000000006CCFE1D1 second address: 000000006CCFE3D9 instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 xchg word ptr [esp], ax 0x00000007 lea ecx, dword ptr [ecx+esi] 0x0000000a xchg dword ptr [esp+04h], esi 0x0000000e jmp 00007FE5151CE616h 0x00000010 cmc 0x00000011 neg al 0x00000013 dec cx 0x00000015 lea ecx, dword ptr [00000000h+edi*4] 0x0000001c mov eax, 63E4BEA4h 0x00000021 jmp 00007FE5151CE7F0h 0x00000026 lea esi, dword ptr [esi+2Ah] 0x00000029 rdtsc |
Source: C:\Windows\System32\loaddll32.exe | RDTSC instruction interceptor: First address: 000000006CD121EC second address: 000000006CD121EE instructions: 0x00000000 rdtsc 0x00000002 rdtsc |
Source: C:\Windows\System32\loaddll32.exe | RDTSC instruction interceptor: First address: 000000006CCEA7C8 second address: 000000006CCEA807 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5151CE5ECh 0x00000004 sub esp, 000000A0h 0x0000000a call 00007FE5151CE665h 0x0000000f setno bl 0x00000012 mov al, byte ptr [esp] 0x00000015 rdtsc |
Source: C:\Windows\System32\loaddll32.exe | RDTSC instruction interceptor: First address: 000000006CD039C4 second address: 000000006CD039F9 instructions: 0x00000000 rdtsc 0x00000002 lea esp, dword ptr [esp+02h] 0x00000006 jmp 00007FE5150D13D5h 0x00000008 lea ebp, dword ptr [ebp-00000520h] 0x0000000e xchg eax, edx 0x0000000f lea eax, dword ptr [00000000h+ecx*4] 0x00000016 jmp 00007FE5150D143Ch 0x00000018 mov dx, bp 0x0000001b lea eax, dword ptr [edi+ebp] 0x0000001e not eax 0x00000020 xchg dword ptr [esp+3Ch], ebp 0x00000024 bsf dx, di 0x00000028 rdtsc |
Source: C:\Windows\System32\loaddll32.exe | RDTSC instruction interceptor: First address: 000000006CD3A396 second address: 000000006CD3A359 instructions: 0x00000000 rdtsc 0x00000002 bswap ecx 0x00000004 mov dh, byte ptr [esp] 0x00000007 jmp 00007FE5151CE4E8h 0x0000000c add esi, 02h 0x0000000f btr cx, ax 0x00000013 jno 00007FE5151CE6EDh 0x00000019 rdtsc |
Source: C:\Windows\System32\loaddll32.exe | RDTSC instruction interceptor: First address: 000000006CD3A359 second address: 000000006CD3A2DB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5150D1351h 0x00000007 not cl 0x00000009 call 00007FE5150D144Dh 0x0000000e lea edx, dword ptr [00000000h+esi*4] 0x00000015 mov cx, E8B9h 0x00000019 rcl dx, cl 0x0000001c btc cx, ax 0x00000020 xchg al, cl 0x00000022 jmp 00007FE5150D13C9h 0x00000024 xchg dword ptr [esp], edi 0x00000027 rdtsc |
Source: C:\Windows\System32\loaddll32.exe | RDTSC instruction interceptor: First address: 000000006CD3A2DB second address: 000000006CD3A2D0 instructions: 0x00000000 rdtsc 0x00000002 btc eax, ebx 0x00000005 mov eax, edx 0x00000007 xchg ch, ah 0x00000009 lea edi, dword ptr [edi-0004D459h] 0x0000000f jmp 00007FE5151CE5E8h 0x00000011 mov eax, edi 0x00000013 mov dx, EA8Dh 0x00000017 lea ecx, dword ptr [ebx+52h] 0x0000001a xchg dword ptr [esp], edi 0x0000001d bswap edx 0x0000001f rdtsc |
Source: C:\Windows\System32\loaddll32.exe | RDTSC instruction interceptor: First address: 000000006CD3A2D0 second address: 000000006CCECE3D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5150D1455h 0x00000004 push dword ptr [esp] 0x00000007 retn 0004h 0x0000000a movzx ecx, byte ptr [ebp+00h] 0x0000000e jmp 00007FE5150D13DFh 0x00000010 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CD2288F second address: 000000006CD2288F instructions: 0x00000000 rdtsc 0x00000002 mov di, word ptr [esp] 0x00000006 mov dword ptr [esp+1Ch], ebp 0x0000000a popad 0x0000000b jmp 00007FE5151CE62Eh 0x0000000d lea eax, dword ptr [eax+74h] 0x00000010 mov ecx, dword ptr [eax] 0x00000012 pop eax 0x00000013 jmp 00007FE5151CE632h 0x00000015 dec dword ptr [ebp+74h] 0x00000018 sub esp, 16h 0x0000001b lea esp, dword ptr [esp+02h] 0x0000001f jmp 00007FE5151CE644h 0x00000021 lea esp, dword ptr [esp+14h] 0x00000025 test ecx, ecx 0x00000027 jne 00007FE5151CE56Eh 0x0000002d mov byte ptr [eax], 00000000h 0x00000030 jmp 00007FE5151CE616h 0x00000032 inc eax 0x00000033 jmp 00007FE5151CE5E0h 0x00000035 push eax 0x00000036 jmp 00007FE5151CE641h 0x00000038 pushad 0x00000039 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CD49DB9 second address: 000000006CD49ED1 instructions: 0x00000000 rdtsc 0x00000002 setnle cl 0x00000005 setb cl 0x00000008 jmp 00007FE5150D1451h 0x0000000a sub edi, 08h 0x0000000d xchg ch, cl 0x0000000f bsr ecx, ebx 0x00000012 je 00007FE5150D13E2h 0x00000014 jne 00007FE5150D1BF3h 0x0000001a neg ch 0x0000001c jmp 00007FE5150D12DFh 0x00000021 pushad 0x00000022 xchg eax, esi 0x00000023 sub esp, 0Fh 0x00000026 jbe 00007FE5150D1381h 0x0000002c xchg word ptr [esp+06h], ax 0x00000031 mov dx, 2507h 0x00000035 lea esp, dword ptr [esp+03h] 0x00000039 mov dword ptr [esp+24h], edi 0x0000003d lea esp, dword ptr [esp+0Ch] 0x00000041 jmp 00007FE5150D0E0Fh 0x00000046 popad 0x00000047 mov dword ptr [ecx], edx 0x00000049 jmp 00007FE5150D1335h 0x0000004e rcr ch, cl 0x00000050 jbe 00007FE5150D13E8h 0x00000052 setno ch 0x00000055 jmp 00007FE5150D1440h 0x00000057 mov edx, edi 0x00000059 add edx, 04h 0x0000005c jnl 00007FE5150D13D3h 0x0000005e jmp 00007FE5150D13EAh 0x00000060 mov dword ptr [edx], eax 0x00000062 bsf eax, ebp 0x00000065 call 00007FE5150D1413h 0x0000006a pop word ptr [esp] 0x0000006e lea esp, dword ptr [esp+02h] 0x00000072 call 00007FE5150D1406h 0x00000077 jmp 00007FE5150D143Ch 0x00000079 shl eax, 03h 0x0000007c lea edx, dword ptr [00000000h+ebp*4] 0x00000083 inc cx 0x00000085 lea ecx, dword ptr [eax+edi] 0x00000088 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CD49ED1 second address: 000000006CD49EEE instructions: 0x00000000 rdtsc 0x00000002 xchg dword ptr [esp], ebx 0x00000005 jmp 00007FE5151CE5C2h 0x00000007 not ah 0x00000009 mov eax, DB0AC25Ah 0x0000000e mov edx, F128A53Ch 0x00000013 pushfd 0x00000014 jmp 00007FE5151CE627h 0x00000016 lea ebx, dword ptr [ebx-00044E40h] 0x0000001c mov dx, word ptr [esp] 0x00000020 mov dh, cl 0x00000022 neg dx 0x00000025 jmp 00007FE5151CE643h 0x00000027 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CD49EEE second address: 000000006CD0504B instructions: 0x00000000 rdtsc 0x00000002 btc eax, esp 0x00000005 xchg dword ptr [esp+04h], ebx 0x00000009 mov cx, 5D6Fh 0x0000000d xchg cx, ax 0x00000010 sub esp, 1Eh 0x00000013 jmp 00007FE5150D13D7h 0x00000015 mov dl, bl 0x00000017 not cx 0x0000001a lea esp, dword ptr [esp+02h] 0x0000001e push dword ptr [esp+20h] 0x00000022 retn 0024h 0x00000025 jmp 00007FE5150D1448h 0x00000027 stc 0x00000028 jnle 00007FE5150D13B9h 0x0000002a bsf cx, di 0x0000002e rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CD32D5E second address: 000000006CD32CA4 instructions: 0x00000000 rdtsc 0x00000002 mov ax, sp 0x00000005 jmp 00007FE5151CE54Eh 0x0000000a lea eax, dword ptr [edi+edi] 0x0000000d rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CD32CA4 second address: 000000006CD01849 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE51509FFA3h 0x00000007 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CD3B6DE second address: 000000006CD0504B instructions: 0x00000000 rdtsc 0x00000002 mov word ptr [edi], cx 0x00000005 bswap eax 0x00000007 setb al 0x0000000a inc cx 0x0000000c jmp 00007FE5151CE641h 0x0000000e jne 00007FE5151CE5E5h 0x00000010 jmp 00007FE515197F65h 0x00000015 jmp 00007FE5151CE658h 0x00000017 stc 0x00000018 jnle 00007FE5151CE5C9h 0x0000001a bsf cx, di 0x0000001e rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CD034C3 second address: 000000006CD0353D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5150D1438h 0x00000004 push ebp 0x00000005 call 00007FE5150D13E3h 0x0000000a push esp 0x0000000b mov esi, dword ptr [esp+03h] 0x0000000f bswap eax 0x00000011 mov byte ptr [esp+01h], cl 0x00000015 mov word ptr [esp+01h], sp 0x0000001a jmp 00007FE5150D1429h 0x0000001c xchg dword ptr [esp+04h], ebp 0x00000020 pushad 0x00000021 inc cx 0x00000023 bsf di, bx 0x00000027 pop esi 0x00000028 clc 0x00000029 jmp 00007FE5150D13DDh 0x0000002b lea ebp, dword ptr [ebp-0000003Ch] 0x00000031 mov cl, dl 0x00000033 bsr edi, ecx 0x00000036 cmc 0x00000037 cmc 0x00000038 jmp 00007FE5150D144Dh 0x0000003a xchg dword ptr [esp+20h], ebp 0x0000003e inc cl 0x00000040 cmc 0x00000041 setne dh 0x00000044 lea edi, dword ptr [ecx+ebp] 0x00000047 push dword ptr [esp+20h] 0x0000004b retn 0024h 0x0000004e bswap edx 0x00000050 jmp 00007FE5150D1474h 0x00000052 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CD3EFCD second address: 000000006CCFEEEA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007FE5151CE5F7h 0x00000008 sub esi, 08h 0x0000000b pushfd 0x0000000c jmp 00007FE5151CE657h 0x0000000e lea esp, dword ptr [esp+02h] 0x00000012 lea esp, dword ptr [esp+02h] 0x00000016 xchg edx, ecx 0x00000018 call 00007FE5151CE5F0h 0x0000001d add esp, 01h 0x00000020 jnle 00007FE5151CE648h 0x00000022 jmp 00007FE5151CE5FAh 0x00000024 lea esp, dword ptr [esp+03h] 0x00000028 jmp 00007FE5151CE624h 0x0000002a mov dword ptr [esi], ecx 0x0000002c mov ecx, edx 0x0000002e mov cx, word ptr [esp] 0x00000032 bsf ecx, ebx 0x00000035 jmp 00007FE5151CE65Fh 0x00000037 jnle 00007FE5151CE5C7h 0x00000039 mov cx, 166Ah 0x0000003d jmp 00007FE5151CE631h 0x0000003f mov dword ptr [esi+04h], eax 0x00000042 push dx 0x00000044 add esp, 01h 0x00000047 jmp 00007FE5151CE64Ah 0x00000049 jnle 00007FE5151CE5DCh 0x0000004b xchg byte ptr [esp], ah 0x0000004e lea esp, dword ptr [esp+01h] 0x00000052 jmp 00007FE51518E483h 0x00000057 mov cl, byte ptr [esp] 0x0000005a rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CD34C1C second address: 000000006CD34C48 instructions: 0x00000000 rdtsc 0x00000002 sub ebp, 02h 0x00000005 neg cx 0x00000008 js 00007FE5150D141Ch 0x0000000a add edx, 213E919Dh 0x00000010 mov edx, eax 0x00000012 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CD4FABF second address: 000000006CD01849 instructions: 0x00000000 rdtsc 0x00000002 sub esp, 03h 0x00000005 jl 00007FE5151CE647h 0x00000007 mov word ptr [esp], sp 0x0000000b push word ptr [esp+02h] 0x00000010 sub esp, 16h 0x00000013 lea esp, dword ptr [esp+03h] 0x00000017 jmp 00007FE5151CE7CAh 0x0000001c sub esi, 08h 0x0000001f pushad 0x00000020 cmc 0x00000021 jl 00007FE5151CE512h 0x00000027 jnl 00007FE5151CE50Ch 0x0000002d call 00007FE5151CE5F1h 0x00000032 pop dword ptr [esp+10h] 0x00000036 jmp 00007FE5151CE5F6h 0x00000038 xchg edx, ecx 0x0000003a clc 0x0000003b jnp 00007FE5151CE629h 0x0000003d jp 00007FE5151CE627h 0x0000003f mov dword ptr [esi], ecx 0x00000041 jmp 00007FE5151CE663h 0x00000043 mov ch, 19h 0x00000045 mov cx, 60D1h 0x00000049 lea ecx, dword ptr [00000000h+ebx*4] 0x00000050 bsr ecx, edi 0x00000053 jle 00007FE5151CE5DFh 0x00000055 jnle 00007FE5151CE5DDh 0x00000057 jmp 00007FE5151CE5FAh 0x00000059 mov ecx, esi 0x0000005b jmp 00007FE5151CE626h 0x0000005d add ecx, 04h 0x00000060 jmp 00007FE5151CE65Fh 0x00000062 jne 00007FE5151CE5C7h 0x00000064 mov dword ptr [ecx], eax 0x00000066 bswap eax 0x00000068 mov ecx, esi 0x0000006a jmp 00007FE515180296h 0x0000006f rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CD2288F second address: 000000006CD2288F instructions: 0x00000000 rdtsc 0x00000002 mov di, word ptr [esp] 0x00000006 mov dword ptr [esp+1Ch], ebp 0x0000000a popad 0x0000000b jmp 00007FE5150D141Eh 0x0000000d lea eax, dword ptr [eax+74h] 0x00000010 mov ecx, dword ptr [eax] 0x00000012 pop eax 0x00000013 jmp 00007FE5150D1422h 0x00000015 dec dword ptr [ebp+74h] 0x00000018 sub esp, 16h 0x0000001b lea esp, dword ptr [esp+02h] 0x0000001f jmp 00007FE5150D1434h 0x00000021 lea esp, dword ptr [esp+14h] 0x00000025 test ecx, ecx 0x00000027 jne 00007FE5150D135Eh 0x0000002d mov byte ptr [eax], 00000000h 0x00000030 jmp 00007FE5150D1406h 0x00000032 inc eax 0x00000033 jmp 00007FE5150D13D0h 0x00000035 push eax 0x00000036 jmp 00007FE5150D1431h 0x00000038 pushad 0x00000039 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CD49DB9 second address: 000000006CD49ED1 instructions: 0x00000000 rdtsc 0x00000002 setnle cl 0x00000005 setb cl 0x00000008 jmp 00007FE5151CE661h 0x0000000a sub edi, 08h 0x0000000d xchg ch, cl 0x0000000f bsr ecx, ebx 0x00000012 je 00007FE5151CE5F2h 0x00000014 jne 00007FE5151CEE03h 0x0000001a neg ch 0x0000001c jmp 00007FE5151CE4EFh 0x00000021 pushad 0x00000022 xchg eax, esi 0x00000023 sub esp, 0Fh 0x00000026 jbe 00007FE5151CE591h 0x0000002c xchg word ptr [esp+06h], ax 0x00000031 mov dx, 2507h 0x00000035 lea esp, dword ptr [esp+03h] 0x00000039 mov dword ptr [esp+24h], edi 0x0000003d lea esp, dword ptr [esp+0Ch] 0x00000041 jmp 00007FE5151CE01Fh 0x00000046 popad 0x00000047 mov dword ptr [ecx], edx 0x00000049 jmp 00007FE5151CE545h 0x0000004e rcr ch, cl 0x00000050 jbe 00007FE5151CE5F8h 0x00000052 setno ch 0x00000055 jmp 00007FE5151CE66Ah 0x00000057 mov edx, edi 0x00000059 add edx, 04h 0x0000005c jnl 00007FE5151CE5E3h 0x0000005e jmp 00007FE5151CE5FAh 0x00000060 mov dword ptr [edx], eax 0x00000062 bsf eax, ebp 0x00000065 call 00007FE5151CE623h 0x0000006a pop word ptr [esp] 0x0000006e lea esp, dword ptr [esp+02h] 0x00000072 call 00007FE5151CE616h 0x00000077 jmp 00007FE5151CE64Ch 0x00000079 shl eax, 03h 0x0000007c lea edx, dword ptr [00000000h+ebp*4] 0x00000083 inc cx 0x00000085 lea ecx, dword ptr [eax+edi] 0x00000088 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CD49ED1 second address: 000000006CD49EEE instructions: 0x00000000 rdtsc 0x00000002 xchg dword ptr [esp], ebx 0x00000005 jmp 00007FE5150D13B2h 0x00000007 not ah 0x00000009 mov eax, DB0AC25Ah 0x0000000e mov edx, F128A53Ch 0x00000013 pushfd 0x00000014 jmp 00007FE5150D1417h 0x00000016 lea ebx, dword ptr [ebx-00044E40h] 0x0000001c mov dx, word ptr [esp] 0x00000020 mov dh, cl 0x00000022 neg dx 0x00000025 jmp 00007FE5150D1433h 0x00000027 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CD49EEE second address: 000000006CD0504B instructions: 0x00000000 rdtsc 0x00000002 btc eax, esp 0x00000005 xchg dword ptr [esp+04h], ebx 0x00000009 mov cx, 5D6Fh 0x0000000d xchg cx, ax 0x00000010 sub esp, 1Eh 0x00000013 jmp 00007FE5151CE5E7h 0x00000015 mov dl, bl 0x00000017 not cx 0x0000001a lea esp, dword ptr [esp+02h] 0x0000001e push dword ptr [esp+20h] 0x00000022 retn 0024h 0x00000025 jmp 00007FE5151CE658h 0x00000027 stc 0x00000028 jnle 00007FE5151CE5C9h 0x0000002a bsf cx, di 0x0000002e rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CD32D5E second address: 000000006CD32CA4 instructions: 0x00000000 rdtsc 0x00000002 mov ax, sp 0x00000005 jmp 00007FE5150D133Eh 0x0000000a lea eax, dword ptr [edi+edi] 0x0000000d rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CD32CA4 second address: 000000006CD01849 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE51519D1B3h 0x00000007 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CD3B6DE second address: 000000006CD0504B instructions: 0x00000000 rdtsc 0x00000002 mov word ptr [edi], cx 0x00000005 bswap eax 0x00000007 setb al 0x0000000a inc cx 0x0000000c jmp 00007FE5150D1431h 0x0000000e jne 00007FE5150D13D5h 0x00000010 jmp 00007FE51509AD55h 0x00000015 jmp 00007FE5150D1448h 0x00000017 stc 0x00000018 jnle 00007FE5150D13B9h 0x0000001a bsf cx, di 0x0000001e rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CD034C3 second address: 000000006CD0353D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5151CE648h 0x00000004 push ebp 0x00000005 call 00007FE5151CE5F3h 0x0000000a push esp 0x0000000b mov esi, dword ptr [esp+03h] 0x0000000f bswap eax 0x00000011 mov byte ptr [esp+01h], cl 0x00000015 mov word ptr [esp+01h], sp 0x0000001a jmp 00007FE5151CE639h 0x0000001c xchg dword ptr [esp+04h], ebp 0x00000020 pushad 0x00000021 inc cx 0x00000023 bsf di, bx 0x00000027 pop esi 0x00000028 clc 0x00000029 jmp 00007FE5151CE5EDh 0x0000002b lea ebp, dword ptr [ebp-0000003Ch] 0x00000031 mov cl, dl 0x00000033 bsr edi, ecx 0x00000036 cmc 0x00000037 cmc 0x00000038 jmp 00007FE5151CE65Dh 0x0000003a xchg dword ptr [esp+20h], ebp 0x0000003e inc cl 0x00000040 cmc 0x00000041 setne dh 0x00000044 lea edi, dword ptr [ecx+ebp] 0x00000047 push dword ptr [esp+20h] 0x0000004b retn 0024h 0x0000004e bswap edx 0x00000050 jmp 00007FE5151CE684h 0x00000052 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CD3EFCD second address: 000000006CCFEEEA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007FE5150D13E7h 0x00000008 sub esi, 08h 0x0000000b pushfd 0x0000000c jmp 00007FE5150D1447h 0x0000000e lea esp, dword ptr [esp+02h] 0x00000012 lea esp, dword ptr [esp+02h] 0x00000016 xchg edx, ecx 0x00000018 call 00007FE5150D13E0h 0x0000001d add esp, 01h 0x00000020 jnle 00007FE5150D1438h 0x00000022 jmp 00007FE5150D13EAh 0x00000024 lea esp, dword ptr [esp+03h] 0x00000028 jmp 00007FE5150D1414h 0x0000002a mov dword ptr [esi], ecx 0x0000002c mov ecx, edx 0x0000002e mov cx, word ptr [esp] 0x00000032 bsf ecx, ebx 0x00000035 jmp 00007FE5150D144Fh 0x00000037 jnle 00007FE5150D13B7h 0x00000039 mov cx, 166Ah 0x0000003d jmp 00007FE5150D1421h 0x0000003f mov dword ptr [esi+04h], eax 0x00000042 push dx 0x00000044 add esp, 01h 0x00000047 jmp 00007FE5150D143Ah 0x00000049 jnle 00007FE5150D13CCh 0x0000004b xchg byte ptr [esp], ah 0x0000004e lea esp, dword ptr [esp+01h] 0x00000052 jmp 00007FE515091273h 0x00000057 mov cl, byte ptr [esp] 0x0000005a rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CD34C1C second address: 000000006CD34C48 instructions: 0x00000000 rdtsc 0x00000002 sub ebp, 02h 0x00000005 neg cx 0x00000008 js 00007FE5151CE62Ch 0x0000000a add edx, 213E919Dh 0x00000010 mov edx, eax 0x00000012 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CD4FABF second address: 000000006CD01849 instructions: 0x00000000 rdtsc 0x00000002 sub esp, 03h 0x00000005 jl 00007FE5150D1437h 0x00000007 mov word ptr [esp], sp 0x0000000b push word ptr [esp+02h] 0x00000010 sub esp, 16h 0x00000013 lea esp, dword ptr [esp+03h] 0x00000017 jmp 00007FE5150D15BAh 0x0000001c sub esi, 08h 0x0000001f pushad 0x00000020 cmc 0x00000021 jl 00007FE5150D1302h 0x00000027 jnl 00007FE5150D12FCh 0x0000002d call 00007FE5150D13E1h 0x00000032 pop dword ptr [esp+10h] 0x00000036 jmp 00007FE5150D13E6h 0x00000038 xchg edx, ecx 0x0000003a clc 0x0000003b jnp 00007FE5150D1419h 0x0000003d mov dword ptr [esi], ecx 0x0000003f jmp 00007FE5150D1453h 0x00000041 mov ch, 19h 0x00000043 mov cx, 60D1h 0x00000047 lea ecx, dword ptr [00000000h+ebx*4] 0x0000004e bsr ecx, edi 0x00000051 jle 00007FE5150D13CFh 0x00000053 jnle 00007FE5150D13CDh 0x00000055 jmp 00007FE5150D13EAh 0x00000057 mov ecx, esi 0x00000059 jmp 00007FE5150D1416h 0x0000005b add ecx, 04h 0x0000005e jmp 00007FE5150D144Fh 0x00000060 jne 00007FE5150D13B7h 0x00000062 mov dword ptr [ecx], eax 0x00000064 bswap eax 0x00000066 mov ecx, esi 0x00000068 jmp 00007FE515083086h 0x0000006d rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CD12145 second address: 000000006CD12238 instructions: 0x00000000 rdtsc 0x00000002 mov eax, ebx 0x00000004 jmp 00007FE5151CE645h 0x00000006 xchg dword ptr [esp], ecx 0x00000009 mov al, 6Ah 0x0000000b ror ax, cl 0x0000000e setb dh 0x00000011 bsf eax, eax 0x00000014 lea edx, dword ptr [ecx-1DD4EFFBh] 0x0000001a jmp 00007FE5151CE5E6h 0x0000001c lea ecx, dword ptr [ecx-00000024h] 0x00000022 not edx 0x00000024 push edi 0x00000025 mov dx, word ptr [esp+03h] 0x0000002a jmp 00007FE5151CE662h 0x0000002c xchg dword ptr [esp+04h], ecx 0x00000030 bswap edx 0x00000032 lea eax, dword ptr [00000000h+ecx*4] 0x00000039 mov ah, EDh 0x0000003b push dword ptr [esp+04h] 0x0000003f retn 0008h 0x00000042 stc 0x00000043 jbe 00007FE5151CE69Ch 0x00000049 call 00007FE5151CE833h 0x0000004e xchg edx, eax 0x00000050 mov eax, edi 0x00000052 mov dx, bp 0x00000055 push edi 0x00000056 xchg dword ptr [esp+04h], ecx 0x0000005a jmp 00007FE5151CE47Dh 0x0000005f mov ah, 99h 0x00000061 sub esp, 01h 0x00000064 neg dx 0x00000067 mov byte ptr [esp], dh 0x0000006a cmc 0x0000006b lea esp, dword ptr [esp+01h] 0x0000006f jmp 00007FE5151CE5E2h 0x00000071 lea ecx, dword ptr [ecx+34h] 0x00000074 call 00007FE5151CE5F7h 0x00000079 mov word ptr [esp], ax 0x0000007d lea edx, dword ptr [edi+2Dh] 0x00000080 lea eax, dword ptr [00000000h+edx*4] 0x00000087 jmp 00007FE5151CE620h 0x00000089 xchg dword ptr [esp+08h], ecx 0x0000008d mov al, bl 0x0000008f sub esp, 0Ah 0x00000092 mov dword ptr [esp+04h], esi 0x00000096 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CD12145 second address: 000000006CD12238 instructions: 0x00000000 rdtsc 0x00000002 mov eax, ebx 0x00000004 jmp 00007FE5150D1435h 0x00000006 xchg dword ptr [esp], ecx 0x00000009 mov al, 6Ah 0x0000000b ror ax, cl 0x0000000e setb dh 0x00000011 bsf eax, eax 0x00000014 lea edx, dword ptr [ecx-1DD4EFFBh] 0x0000001a jmp 00007FE5150D13D6h 0x0000001c lea ecx, dword ptr [ecx-00000024h] 0x00000022 not edx 0x00000024 push edi 0x00000025 mov dx, word ptr [esp+03h] 0x0000002a jmp 00007FE5150D1452h 0x0000002c xchg dword ptr [esp+04h], ecx 0x00000030 bswap edx 0x00000032 lea eax, dword ptr [00000000h+ecx*4] 0x00000039 mov ah, EDh 0x0000003b push dword ptr [esp+04h] 0x0000003f retn 0008h 0x00000042 stc 0x00000043 jbe 00007FE5150D148Ch 0x00000049 call 00007FE5150D1623h 0x0000004e xchg edx, eax 0x00000050 mov eax, edi 0x00000052 mov dx, bp 0x00000055 push edi 0x00000056 xchg dword ptr [esp+04h], ecx 0x0000005a jmp 00007FE5150D126Dh 0x0000005f mov ah, 99h 0x00000061 sub esp, 01h 0x00000064 neg dx 0x00000067 mov byte ptr [esp], dh 0x0000006a cmc 0x0000006b lea esp, dword ptr [esp+01h] 0x0000006f jmp 00007FE5150D13D2h 0x00000071 lea ecx, dword ptr [ecx+34h] 0x00000074 call 00007FE5150D13E7h 0x00000079 mov word ptr [esp], ax 0x0000007d lea edx, dword ptr [edi+2Dh] 0x00000080 lea eax, dword ptr [00000000h+edx*4] 0x00000087 jmp 00007FE5150D1410h 0x00000089 xchg dword ptr [esp+08h], ecx 0x0000008d mov al, bl 0x0000008f sub esp, 0Ah 0x00000092 mov dword ptr [esp+04h], esi 0x00000096 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CD39B34 second address: 000000006CD39BA7 instructions: 0x00000000 rdtsc 0x00000002 ror eax, 0Bh 0x00000005 je 00007FE5151CE5D0h 0x00000007 bswap eax 0x00000009 mov ah, byte ptr [esp] 0x0000000c mov dx, bp 0x0000000f call 00007FE5151CE616h 0x00000014 mov edx, ebp 0x00000016 mov dh, ch 0x00000018 lea eax, dword ptr [ebp+ebp+00h] 0x0000001c sub esp, 19h 0x0000001f lea esp, dword ptr [esp+01h] 0x00000023 jmp 00007FE5151CE655h 0x00000025 xchg dword ptr [esp+18h], esi 0x00000029 xchg edx, eax 0x0000002b mov dx, C92Fh 0x0000002f rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CD4CF3F second address: 000000006CD4CEDE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5150D1FA9h 0x00000007 mov dx, word ptr [esp] 0x0000000b push dword ptr [esp+04h] 0x0000000f retn 0008h 0x00000012 lea esp, dword ptr [esp+02h] 0x00000016 mov ecx, dword ptr [ebp+00h] 0x00000019 mov dx, 4C2Eh 0x0000001d jmp 00007FE5150D1407h 0x0000001f mov dh, byte ptr [esp] 0x00000022 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CD49DB9 second address: 000000006CD49ED1 instructions: 0x00000000 rdtsc 0x00000002 setnle cl 0x00000005 setb cl 0x00000008 jmp 00007FE5150D1451h 0x0000000a sub edi, 08h 0x0000000d xchg ch, cl 0x0000000f bsr ecx, ebx 0x00000012 je 00007FE5150D13E2h 0x00000014 jne 00007FE5150D1BF3h 0x0000001a neg ch 0x0000001c jmp 00007FE5150D12DFh 0x00000021 pushad 0x00000022 xchg eax, esi 0x00000023 sub esp, 0Fh 0x00000026 jbe 00007FE5150D1381h 0x0000002c xchg word ptr [esp+06h], ax 0x00000031 mov dx, 2507h 0x00000035 lea esp, dword ptr [esp+03h] 0x00000039 mov dword ptr [esp+24h], edi 0x0000003d lea esp, dword ptr [esp+0Ch] 0x00000041 jmp 00007FE5150D0E0Fh 0x00000046 popad 0x00000047 mov dword ptr [ecx], edx 0x00000049 jmp 00007FE5150D1335h 0x0000004e rcr ch, cl 0x00000050 jbe 00007FE5150D13E8h 0x00000052 setno ch 0x00000055 jmp 00007FE5150D145Ah 0x00000057 mov edx, edi 0x00000059 add edx, 04h 0x0000005c jnl 00007FE5150D13D3h 0x0000005e jmp 00007FE5150D13EAh 0x00000060 mov dword ptr [edx], eax 0x00000062 bsf eax, ebp 0x00000065 call 00007FE5150D1413h 0x0000006a pop word ptr [esp] 0x0000006e lea esp, dword ptr [esp+02h] 0x00000072 call 00007FE5150D1406h 0x00000077 jmp 00007FE5150D143Ch 0x00000079 shl eax, 03h 0x0000007c lea edx, dword ptr [00000000h+ebp*4] 0x00000083 inc cx 0x00000085 lea ecx, dword ptr [eax+edi] 0x00000088 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CD4FABF second address: 000000006CD01849 instructions: 0x00000000 rdtsc 0x00000002 sub esp, 03h 0x00000005 jl 00007FE5151CE647h 0x00000007 mov word ptr [esp], sp 0x0000000b push word ptr [esp+02h] 0x00000010 sub esp, 16h 0x00000013 lea esp, dword ptr [esp+03h] 0x00000017 jmp 00007FE5151CE7CAh 0x0000001c sub esi, 08h 0x0000001f pushad 0x00000020 cmc 0x00000021 jl 00007FE5151CE512h 0x00000027 jnl 00007FE5151CE50Ch 0x0000002d call 00007FE5151CE5F1h 0x00000032 pop dword ptr [esp+10h] 0x00000036 jmp 00007FE5151CE5F6h 0x00000038 xchg edx, ecx 0x0000003a clc 0x0000003b jnp 00007FE5151CE629h 0x0000003d mov dword ptr [esi], ecx 0x0000003f jmp 00007FE5151CE663h 0x00000041 mov ch, 19h 0x00000043 mov cx, 60D1h 0x00000047 lea ecx, dword ptr [00000000h+ebx*4] 0x0000004e bsr ecx, edi 0x00000051 jle 00007FE5151CE5DFh 0x00000053 jnle 00007FE5151CE5DDh 0x00000055 jmp 00007FE5151CE5FAh 0x00000057 mov ecx, esi 0x00000059 jmp 00007FE5151CE626h 0x0000005b add ecx, 04h 0x0000005e jmp 00007FE5151CE65Fh 0x00000060 jne 00007FE5151CE5C7h 0x00000062 mov dword ptr [ecx], eax 0x00000064 bswap eax 0x00000066 mov ecx, esi 0x00000068 jmp 00007FE515180296h 0x0000006d rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CD39B34 second address: 000000006CD39BA7 instructions: 0x00000000 rdtsc 0x00000002 ror eax, 0Bh 0x00000005 je 00007FE5150D13C0h 0x00000007 bswap eax 0x00000009 mov ah, byte ptr [esp] 0x0000000c mov dx, bp 0x0000000f call 00007FE5150D1406h 0x00000014 mov edx, ebp 0x00000016 mov dh, ch 0x00000018 lea eax, dword ptr [ebp+ebp+00h] 0x0000001c sub esp, 19h 0x0000001f lea esp, dword ptr [esp+01h] 0x00000023 jmp 00007FE5150D1445h 0x00000025 xchg dword ptr [esp+18h], esi 0x00000029 xchg edx, eax 0x0000002b mov dx, C92Fh 0x0000002f rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CD4CF3F second address: 000000006CD4CEDE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5151CF1B9h 0x00000007 mov dx, word ptr [esp] 0x0000000b push dword ptr [esp+04h] 0x0000000f retn 0008h 0x00000012 lea esp, dword ptr [esp+02h] 0x00000016 mov ecx, dword ptr [ebp+00h] 0x00000019 mov dx, 4C2Eh 0x0000001d jmp 00007FE5151CE617h 0x0000001f mov dh, byte ptr [esp] 0x00000022 rdtsc |
Source: C:\Windows\System32\loaddll32.exe | RDTSC instruction interceptor: First address: 000000006CD2288F second address: 000000006CD2288F instructions: 0x00000000 rdtsc 0x00000002 mov di, word ptr [esp] 0x00000006 mov dword ptr [esp+1Ch], ebp 0x0000000a popad 0x0000000b jmp 00007FE5150D141Eh 0x0000000d lea eax, dword ptr [eax+74h] 0x00000010 mov ecx, dword ptr [eax] 0x00000012 pop eax 0x00000013 jmp 00007FE5150D1422h 0x00000015 dec dword ptr [ebp+74h] 0x00000018 sub esp, 16h 0x0000001b lea esp, dword ptr [esp+02h] 0x0000001f jmp 00007FE5150D1434h 0x00000021 lea esp, dword ptr [esp+14h] 0x00000025 test ecx, ecx 0x00000027 jne 00007FE5150D135Eh 0x0000002d mov byte ptr [eax], 00000000h 0x00000030 jmp 00007FE5150D1406h 0x00000032 inc eax 0x00000033 jmp 00007FE5150D13D0h 0x00000035 push eax 0x00000036 jmp 00007FE5150D1431h 0x00000038 pushad 0x00000039 rdtsc |
Source: C:\Windows\System32\loaddll32.exe | RDTSC instruction interceptor: First address: 000000006CD49DB9 second address: 000000006CD49ED1 instructions: 0x00000000 rdtsc 0x00000002 setnle cl 0x00000005 setb cl 0x00000008 jmp 00007FE5151CE661h 0x0000000a sub edi, 08h 0x0000000d xchg ch, cl 0x0000000f bsr ecx, ebx 0x00000012 je 00007FE5151CE5F2h 0x00000014 jne 00007FE5151CEE03h 0x0000001a neg ch 0x0000001c jmp 00007FE5151CE4EFh 0x00000021 pushad 0x00000022 xchg eax, esi 0x00000023 sub esp, 0Fh 0x00000026 jbe 00007FE5151CE591h 0x0000002c xchg word ptr [esp+06h], ax 0x00000031 mov dx, 2507h 0x00000035 lea esp, dword ptr [esp+03h] 0x00000039 mov dword ptr [esp+24h], edi 0x0000003d lea esp, dword ptr [esp+0Ch] 0x00000041 jmp 00007FE5151CE01Fh 0x00000046 popad 0x00000047 mov dword ptr [ecx], edx 0x00000049 jmp 00007FE5151CE545h 0x0000004e rcr ch, cl 0x00000050 jbe 00007FE5151CE5F8h 0x00000052 setno ch 0x00000055 jmp 00007FE5151CE66Ah 0x00000057 mov edx, edi 0x00000059 add edx, 04h 0x0000005c jnl 00007FE5151CE5E3h 0x0000005e jmp 00007FE5151CE5FAh 0x00000060 mov dword ptr [edx], eax 0x00000062 bsf eax, ebp 0x00000065 call 00007FE5151CE623h 0x0000006a pop word ptr [esp] 0x0000006e lea esp, dword ptr [esp+02h] 0x00000072 call 00007FE5151CE616h 0x00000077 jmp 00007FE5151CE64Ch 0x00000079 shl eax, 03h 0x0000007c lea edx, dword ptr [00000000h+ebp*4] 0x00000083 inc cx 0x00000085 lea ecx, dword ptr [eax+edi] 0x00000088 rdtsc |
Source: C:\Windows\System32\loaddll32.exe | RDTSC instruction interceptor: First address: 000000006CD49ED1 second address: 000000006CD49EEE instructions: 0x00000000 rdtsc 0x00000002 xchg dword ptr [esp], ebx 0x00000005 jmp 00007FE5150D13B2h 0x00000007 not ah 0x00000009 mov eax, DB0AC25Ah 0x0000000e mov edx, F128A53Ch 0x00000013 pushfd 0x00000014 jmp 00007FE5150D1417h 0x00000016 lea ebx, dword ptr [ebx-00044E40h] 0x0000001c mov dx, word ptr [esp] 0x00000020 mov dh, cl 0x00000022 neg dx 0x00000025 jmp 00007FE5150D1433h 0x00000027 rdtsc |
Source: C:\Windows\System32\loaddll32.exe | RDTSC instruction interceptor: First address: 000000006CD49EEE second address: 000000006CD0504B instructions: 0x00000000 rdtsc 0x00000002 btc eax, esp 0x00000005 xchg dword ptr [esp+04h], ebx 0x00000009 mov cx, 5D6Fh 0x0000000d xchg cx, ax 0x00000010 sub esp, 1Eh 0x00000013 jmp 00007FE5151CE5E7h 0x00000015 mov dl, bl 0x00000017 not cx 0x0000001a lea esp, dword ptr [esp+02h] 0x0000001e push dword ptr [esp+20h] 0x00000022 retn 0024h 0x00000025 jmp 00007FE5151CE658h 0x00000027 stc 0x00000028 jnle 00007FE5151CE5C9h 0x0000002a bsf cx, di 0x0000002e rdtsc |
Source: C:\Windows\System32\loaddll32.exe | RDTSC instruction interceptor: First address: 000000006CD32D5E second address: 000000006CD32CA4 instructions: 0x00000000 rdtsc 0x00000002 mov ax, sp 0x00000005 jmp 00007FE5151CE54Eh 0x0000000a lea eax, dword ptr [edi+edi] 0x0000000d rdtsc |
Source: C:\Windows\System32\loaddll32.exe | RDTSC instruction interceptor: First address: 000000006CD32CA4 second address: 000000006CD01849 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE51509FFA3h 0x00000007 rdtsc |
Source: C:\Windows\System32\loaddll32.exe | RDTSC instruction interceptor: First address: 000000006CD3B6DE second address: 000000006CD0504B instructions: 0x00000000 rdtsc 0x00000002 mov word ptr [edi], cx 0x00000005 bswap eax 0x00000007 setb al 0x0000000a inc cx 0x0000000c jmp 00007FE5151CE641h 0x0000000e jne 00007FE5151CE5E5h 0x00000010 jmp 00007FE515197F65h 0x00000015 jmp 00007FE5151CE658h 0x00000017 stc 0x00000018 jnle 00007FE5151CE5C9h 0x0000001a bsf cx, di 0x0000001e rdtsc |
Source: C:\Windows\System32\loaddll32.exe | RDTSC instruction interceptor: First address: 000000006CD034C3 second address: 000000006CD0353D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5150D1438h 0x00000004 push ebp 0x00000005 call 00007FE5150D13E3h 0x0000000a push esp 0x0000000b mov esi, dword ptr [esp+03h] 0x0000000f bswap eax 0x00000011 mov byte ptr [esp+01h], cl 0x00000015 mov word ptr [esp+01h], sp 0x0000001a jmp 00007FE5150D1429h 0x0000001c xchg dword ptr [esp+04h], ebp 0x00000020 pushad 0x00000021 inc cx 0x00000023 bsf di, bx 0x00000027 pop esi 0x00000028 clc 0x00000029 jmp 00007FE5150D13DDh 0x0000002b lea ebp, dword ptr [ebp-0000003Ch] 0x00000031 mov cl, dl 0x00000033 bsr edi, ecx 0x00000036 cmc 0x00000037 cmc 0x00000038 jmp 00007FE5150D144Dh 0x0000003a xchg dword ptr [esp+20h], ebp 0x0000003e inc cl 0x00000040 cmc 0x00000041 setne dh 0x00000044 lea edi, dword ptr [ecx+ebp] 0x00000047 push dword ptr [esp+20h] 0x0000004b retn 0024h 0x0000004e bswap edx 0x00000050 jmp 00007FE5150D1474h 0x00000052 rdtsc |
Source: C:\Windows\System32\loaddll32.exe | RDTSC instruction interceptor: First address: 000000006CD3EFCD second address: 000000006CCFEEEA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007FE5151CE5F7h 0x00000008 sub esi, 08h 0x0000000b pushfd 0x0000000c jmp 00007FE5151CE657h 0x0000000e lea esp, dword ptr [esp+02h] 0x00000012 lea esp, dword ptr [esp+02h] 0x00000016 xchg edx, ecx 0x00000018 call 00007FE5151CE5F0h 0x0000001d add esp, 01h 0x00000020 jnle 00007FE5151CE648h 0x00000022 jmp 00007FE5151CE5FAh 0x00000024 lea esp, dword ptr [esp+03h] 0x00000028 jmp 00007FE5151CE624h 0x0000002a mov dword ptr [esi], ecx 0x0000002c mov ecx, edx 0x0000002e mov cx, word ptr [esp] 0x00000032 bsf ecx, ebx 0x00000035 jmp 00007FE5151CE65Fh 0x00000037 jnle 00007FE5151CE5C7h 0x00000039 mov cx, 166Ah 0x0000003d jmp 00007FE5151CE631h 0x0000003f mov dword ptr [esi+04h], eax 0x00000042 push dx 0x00000044 add esp, 01h 0x00000047 jmp 00007FE5151CE64Ah 0x00000049 jnle 00007FE5151CE5DCh 0x0000004b xchg byte ptr [esp], ah 0x0000004e lea esp, dword ptr [esp+01h] 0x00000052 jmp 00007FE51518E483h 0x00000057 mov cl, byte ptr [esp] 0x0000005a rdtsc |
Source: C:\Windows\System32\loaddll32.exe | RDTSC instruction interceptor: First address: 000000006CD34C1C second address: 000000006CD34C48 instructions: 0x00000000 rdtsc 0x00000002 sub ebp, 02h 0x00000005 neg cx 0x00000008 js 00007FE5150D141Ch 0x0000000a add edx, 213E919Dh 0x00000010 mov edx, eax 0x00000012 rdtsc |
Source: C:\Windows\System32\loaddll32.exe | RDTSC instruction interceptor: First address: 000000006CD4FABF second address: 000000006CD01849 instructions: 0x00000000 rdtsc 0x00000002 sub esp, 03h 0x00000005 jl 00007FE5151CE647h 0x00000007 mov word ptr [esp], sp 0x0000000b push word ptr [esp+02h] 0x00000010 sub esp, 16h 0x00000013 lea esp, dword ptr [esp+03h] 0x00000017 jmp 00007FE5151CE7CAh 0x0000001c sub esi, 08h 0x0000001f pushad 0x00000020 cmc 0x00000021 jl 00007FE5151CE512h 0x00000027 jnl 00007FE5151CE50Ch 0x0000002d call 00007FE5151CE5F1h 0x00000032 pop dword ptr [esp+10h] 0x00000036 jmp 00007FE5151CE5F6h 0x00000038 xchg edx, ecx 0x0000003a clc 0x0000003b jnp 00007FE5151CE629h 0x0000003d jp 00007FE5151CE627h 0x0000003f mov dword ptr [esi], ecx 0x00000041 jmp 00007FE5151CE663h 0x00000043 mov ch, 19h 0x00000045 mov cx, 60D1h 0x00000049 lea ecx, dword ptr [00000000h+ebx*4] 0x00000050 bsr ecx, edi 0x00000053 jle 00007FE5151CE5DFh 0x00000055 jnle 00007FE5151CE5DDh 0x00000057 jmp 00007FE5151CE5FAh 0x00000059 mov ecx, esi 0x0000005b jmp 00007FE5151CE626h 0x0000005d add ecx, 04h 0x00000060 jmp 00007FE5151CE65Fh 0x00000062 jne 00007FE5151CE5C7h 0x00000064 mov dword ptr [ecx], eax 0x00000066 bswap eax 0x00000068 mov ecx, esi 0x0000006a jmp 00007FE515180296h 0x0000006f rdtsc |
Source: C:\Windows\System32\loaddll32.exe | RDTSC instruction interceptor: First address: 000000006CD12145 second address: 000000006CD12238 instructions: 0x00000000 rdtsc 0x00000002 mov eax, ebx 0x00000004 jmp 00007FE5150D1435h 0x00000006 xchg dword ptr [esp], ecx 0x00000009 mov al, 6Ah 0x0000000b ror ax, cl 0x0000000e setb dh 0x00000011 bsf eax, eax 0x00000014 lea edx, dword ptr [ecx-1DD4EFFBh] 0x0000001a jmp 00007FE5150D13D6h 0x0000001c lea ecx, dword ptr [ecx-00000024h] 0x00000022 not edx 0x00000024 push edi 0x00000025 mov dx, word ptr [esp+03h] 0x0000002a jmp 00007FE5150D1452h 0x0000002c xchg dword ptr [esp+04h], ecx 0x00000030 bswap edx 0x00000032 lea eax, dword ptr [00000000h+ecx*4] 0x00000039 mov ah, EDh 0x0000003b push dword ptr [esp+04h] 0x0000003f retn 0008h 0x00000042 stc 0x00000043 jbe 00007FE5150D148Ch 0x00000049 call 00007FE5150D1623h 0x0000004e xchg edx, eax 0x00000050 mov eax, edi 0x00000052 mov dx, bp 0x00000055 push edi 0x00000056 xchg dword ptr [esp+04h], ecx 0x0000005a jmp 00007FE5150D126Dh 0x0000005f mov ah, 99h 0x00000061 sub esp, 01h 0x00000064 neg dx 0x00000067 mov byte ptr [esp], dh 0x0000006a cmc 0x0000006b lea esp, dword ptr [esp+01h] 0x0000006f jmp 00007FE5150D13D2h 0x00000071 lea ecx, dword ptr [ecx+34h] 0x00000074 call 00007FE5150D13E7h 0x00000079 mov word ptr [esp], ax 0x0000007d lea edx, dword ptr [edi+2Dh] 0x00000080 lea eax, dword ptr [00000000h+edx*4] 0x00000087 jmp 00007FE5150D1410h 0x00000089 xchg dword ptr [esp+08h], ecx 0x0000008d mov al, bl 0x0000008f sub esp, 0Ah 0x00000092 mov dword ptr [esp+04h], esi 0x00000096 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CD4AF6D second address: 000000006CD4AF32 instructions: 0x00000000 rdtsc 0x00000002 neg eax 0x00000004 jmp 00007FE5151CE5AFh 0x00000006 jc 00007FE5151CE62Fh 0x00000008 mov eax, dword ptr [esp] 0x0000000b rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CD4AF6D second address: 000000006CD4AF32 instructions: 0x00000000 rdtsc 0x00000002 neg eax 0x00000004 jmp 00007FE5150D139Fh 0x00000006 jc 00007FE5150D141Fh 0x00000008 mov eax, dword ptr [esp] 0x0000000b rdtsc |
Source: C:\Windows\System32\loaddll32.exe | RDTSC instruction interceptor: First address: 000000006CD39B34 second address: 000000006CD39BA7 instructions: 0x00000000 rdtsc 0x00000002 ror eax, 0Bh 0x00000005 je 00007FE5151CE5D0h 0x00000007 bswap eax 0x00000009 mov ah, byte ptr [esp] 0x0000000c mov dx, bp 0x0000000f call 00007FE5151CE616h 0x00000014 mov edx, ebp 0x00000016 mov dh, ch 0x00000018 lea eax, dword ptr [ebp+ebp+00h] 0x0000001c sub esp, 19h 0x0000001f lea esp, dword ptr [esp+01h] 0x00000023 jmp 00007FE5151CE655h 0x00000025 xchg dword ptr [esp+18h], esi 0x00000029 xchg edx, eax 0x0000002b mov dx, C92Fh 0x0000002f rdtsc |
Source: C:\Windows\System32\loaddll32.exe | RDTSC instruction interceptor: First address: 000000006CD4CF3F second address: 000000006CD4CEDE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5150D1FA9h 0x00000007 mov dx, word ptr [esp] 0x0000000b push dword ptr [esp+04h] 0x0000000f retn 0008h 0x00000012 lea esp, dword ptr [esp+02h] 0x00000016 mov ecx, dword ptr [ebp+00h] 0x00000019 mov dx, 4C2Eh 0x0000001d jmp 00007FE5150D1407h 0x0000001f mov dh, byte ptr [esp] 0x00000022 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CD4E930 second address: 000000006CD05094 instructions: 0x00000000 rdtsc 0x00000002 call 00007FE5150D1406h 0x00000007 sub edi, 08h 0x0000000a jmp 00007FE5150D1406h 0x0000000c pushad 0x0000000d lea esp, dword ptr [esp+01h] 0x00000011 add esp, 16h 0x00000014 jo 00007FE5150D24B5h 0x0000001a pop dword ptr [esp] 0x0000001d jmp 00007FE5150D258Ah 0x00000022 lea esp, dword ptr [esp+01h] 0x00000026 jmp 00007FE5150D1303h 0x0000002b mov dword ptr [edi], edx 0x0000002d mov dx, cx 0x00000030 setp dh 0x00000033 mov edx, ebx 0x00000035 jmp 00007FE5150D142Eh 0x00000037 xchg eax, ecx 0x00000038 mov dx, word ptr [esp] 0x0000003c bt edx, edx 0x0000003f jnl 00007FE5150D13E0h 0x00000041 bt edx, esi 0x00000044 lea edx, dword ptr [00000000h+ebx*4] 0x0000004b jmp 00007FE5150D1438h 0x0000004d mov dword ptr [edi+04h], ecx 0x00000050 bswap ecx 0x00000052 rol cl, 00000006h 0x00000055 jp 00007FE5150D13DAh 0x00000057 jnp 00007FE5150D13DFh 0x00000059 dec ecx 0x0000005a jmp 00007FE515086A16h 0x0000005f jmp 00007FE5150D1448h 0x00000061 stc 0x00000062 jnle 00007FE5150D13B9h 0x00000064 bsf cx, di 0x00000068 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CD4E930 second address: 000000006CD0504B instructions: 0x00000000 rdtsc 0x00000002 call 00007FE5151CE616h 0x00000007 sub edi, 08h 0x0000000a jmp 00007FE5151CE616h 0x0000000c pushad 0x0000000d lea esp, dword ptr [esp+01h] 0x00000011 add esp, 16h 0x00000014 jo 00007FE5151CF6C5h 0x0000001a pop dword ptr [esp] 0x0000001d jmp 00007FE5151CF79Ah 0x00000022 lea esp, dword ptr [esp+01h] 0x00000026 jmp 00007FE5151CE513h 0x0000002b mov dword ptr [edi], edx 0x0000002d mov dx, cx 0x00000030 setp dh 0x00000033 mov edx, ebx 0x00000035 jmp 00007FE5151CE63Eh 0x00000037 xchg eax, ecx 0x00000038 mov dx, word ptr [esp] 0x0000003c bt edx, edx 0x0000003f jnl 00007FE5151CE5F0h 0x00000041 bt edx, esi 0x00000044 lea edx, dword ptr [00000000h+ebx*4] 0x0000004b jmp 00007FE5151CE648h 0x0000004d mov dword ptr [edi+04h], ecx 0x00000050 bswap ecx 0x00000052 rol cl, 00000006h 0x00000055 jp 00007FE5151CE5EAh 0x00000057 jnp 00007FE5151CE5EFh 0x00000059 dec ecx 0x0000005a jmp 00007FE515183C26h 0x0000005f jmp 00007FE5151CE658h 0x00000061 stc 0x00000062 jnle 00007FE5151CE5C9h 0x00000064 bsf cx, di 0x00000068 rdtsc |
Source: C:\Windows\System32\loaddll32.exe | RDTSC instruction interceptor: First address: 000000006CD4AF6D second address: 000000006CD4AF32 instructions: 0x00000000 rdtsc 0x00000002 neg eax 0x00000004 jmp 00007FE5151CE5AFh 0x00000006 jc 00007FE5151CE62Fh 0x00000008 mov eax, dword ptr [esp] 0x0000000b rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CD4E930 second address: 000000006CD0504B instructions: 0x00000000 rdtsc 0x00000002 call 00007FE5150D1406h 0x00000007 sub edi, 08h 0x0000000a jmp 00007FE5150D1406h 0x0000000c pushad 0x0000000d lea esp, dword ptr [esp+01h] 0x00000011 add esp, 16h 0x00000014 jo 00007FE5150D24B5h 0x0000001a pop dword ptr [esp] 0x0000001d jmp 00007FE5150D258Ah 0x00000022 lea esp, dword ptr [esp+01h] 0x00000026 jmp 00007FE5150D1303h 0x0000002b mov dword ptr [edi], edx 0x0000002d mov dx, cx 0x00000030 setp dh 0x00000033 mov edx, ebx 0x00000035 jmp 00007FE5150D142Eh 0x00000037 xchg eax, ecx 0x00000038 mov dx, word ptr [esp] 0x0000003c bt edx, edx 0x0000003f jnl 00007FE5150D13E0h 0x00000041 bt edx, esi 0x00000044 lea edx, dword ptr [00000000h+ebx*4] 0x0000004b jmp 00007FE5150D1438h 0x0000004d mov dword ptr [edi+04h], ecx 0x00000050 bswap ecx 0x00000052 rol cl, 00000006h 0x00000055 jp 00007FE5150D13DAh 0x00000057 dec ecx 0x00000058 jmp 00007FE515086A1Dh 0x0000005d jmp 00007FE5150D1448h 0x0000005f stc 0x00000060 jnle 00007FE5150D13B9h 0x00000062 bsf cx, di 0x00000066 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CD3B7D0 second address: 000000006CD3271D instructions: 0x00000000 rdtsc 0x00000002 clc 0x00000003 js 00007FE5151CE71Fh 0x00000009 cmc 0x0000000a cmc 0x0000000b jmp 00007FE5151CE6C9h 0x00000010 sub ebp, 08h 0x00000013 pushad 0x00000014 pop word ptr [esp+05h] 0x00000019 jmp 00007FE5151CE59Ch 0x0000001b lea esp, dword ptr [esp+02h] 0x0000001f xchg edx, ecx 0x00000021 call 00007FE5151CE5F4h 0x00000026 mov word ptr [esp], si 0x0000002a pop word ptr [esp] 0x0000002e lea esp, dword ptr [esp+02h] 0x00000032 jmp 00007FE5151CE641h 0x00000034 mov dword ptr [ebp+00h], ecx 0x00000037 pushfd 0x00000038 neg cx 0x0000003b jnp 00007FE5151CE5EDh 0x0000003d jp 00007FE5151CE630h 0x0000003f mov cx, word ptr [esp+03h] 0x00000044 lea ecx, dword ptr [edx-000000F7h] 0x0000004a jmp 00007FE5151CE5E7h 0x0000004c mov dword ptr [ebp+04h], eax 0x0000004f mov ax, sp 0x00000052 mov ecx, dword ptr [esp] 0x00000055 jmp 00007FE5151C53DAh 0x0000005a jmp 00007FE5151CE6FEh 0x0000005f xchg eax, ecx 0x00000060 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CD3B7D0 second address: 000000006CD3271D instructions: 0x00000000 rdtsc 0x00000002 clc 0x00000003 js 00007FE5150D150Fh 0x00000009 cmc 0x0000000a cmc 0x0000000b jmp 00007FE5150D14B9h 0x00000010 sub ebp, 08h 0x00000013 pushad 0x00000014 pop word ptr [esp+05h] 0x00000019 jmp 00007FE5150D138Ch 0x0000001b lea esp, dword ptr [esp+02h] 0x0000001f xchg edx, ecx 0x00000021 call 00007FE5150D13E4h 0x00000026 mov word ptr [esp], si 0x0000002a pop word ptr [esp] 0x0000002e lea esp, dword ptr [esp+02h] 0x00000032 jmp 00007FE5150D1431h 0x00000034 mov dword ptr [ebp+00h], ecx 0x00000037 pushfd 0x00000038 neg cx 0x0000003b jnp 00007FE5150D13DDh 0x0000003d jp 00007FE5150D1420h 0x0000003f mov cx, word ptr [esp+03h] 0x00000044 lea ecx, dword ptr [edx-000000F7h] 0x0000004a jmp 00007FE5150D13D7h 0x0000004c mov dword ptr [ebp+04h], eax 0x0000004f mov ax, sp 0x00000052 mov ecx, dword ptr [esp] 0x00000055 jmp 00007FE5150C81CAh 0x0000005a jmp 00007FE5150D14EEh 0x0000005f xchg eax, ecx 0x00000060 rdtsc |
Source: C:\Windows\System32\loaddll32.exe | RDTSC instruction interceptor: First address: 000000006CD4E930 second address: 000000006CD0504B instructions: 0x00000000 rdtsc 0x00000002 call 00007FE5151CE616h 0x00000007 sub edi, 08h 0x0000000a jmp 00007FE5151CE616h 0x0000000c pushad 0x0000000d lea esp, dword ptr [esp+01h] 0x00000011 add esp, 16h 0x00000014 jo 00007FE5151CF6C5h 0x0000001a pop dword ptr [esp] 0x0000001d jmp 00007FE5151CF79Ah 0x00000022 lea esp, dword ptr [esp+01h] 0x00000026 jmp 00007FE5151CE513h 0x0000002b mov dword ptr [edi], edx 0x0000002d mov dx, cx 0x00000030 setp dh 0x00000033 mov edx, ebx 0x00000035 jmp 00007FE5151CE63Eh 0x00000037 xchg eax, ecx 0x00000038 mov dx, word ptr [esp] 0x0000003c bt edx, edx 0x0000003f jnl 00007FE5151CE5F0h 0x00000041 bt edx, esi 0x00000044 lea edx, dword ptr [00000000h+ebx*4] 0x0000004b jmp 00007FE5151CE648h 0x0000004d mov dword ptr [edi+04h], ecx 0x00000050 bswap ecx 0x00000052 rol cl, 00000006h 0x00000055 jp 00007FE5151CE5EAh 0x00000057 dec ecx 0x00000058 jmp 00007FE515183C2Dh 0x0000005d jmp 00007FE5151CE658h 0x0000005f stc 0x00000060 jnle 00007FE5151CE5C9h 0x00000062 bsf cx, di 0x00000066 rdtsc |
Source: C:\Windows\System32\loaddll32.exe | RDTSC instruction interceptor: First address: 000000006CD3B7D0 second address: 000000006CD3271D instructions: 0x00000000 rdtsc 0x00000002 clc 0x00000003 js 00007FE5151CE71Fh 0x00000009 cmc 0x0000000a cmc 0x0000000b jmp 00007FE5151CE6C9h 0x00000010 sub ebp, 08h 0x00000013 pushad 0x00000014 pop word ptr [esp+05h] 0x00000019 jmp 00007FE5151CE59Ch 0x0000001b lea esp, dword ptr [esp+02h] 0x0000001f xchg edx, ecx 0x00000021 call 00007FE5151CE5F4h 0x00000026 mov word ptr [esp], si 0x0000002a pop word ptr [esp] 0x0000002e lea esp, dword ptr [esp+02h] 0x00000032 jmp 00007FE5151CE641h 0x00000034 mov dword ptr [ebp+00h], ecx 0x00000037 pushfd 0x00000038 neg cx 0x0000003b jnp 00007FE5151CE5EDh 0x0000003d jp 00007FE5151CE630h 0x0000003f mov cx, word ptr [esp+03h] 0x00000044 lea ecx, dword ptr [edx-000000F7h] 0x0000004a jmp 00007FE5151CE5E7h 0x0000004c mov dword ptr [ebp+04h], eax 0x0000004f mov ax, sp 0x00000052 mov ecx, dword ptr [esp] 0x00000055 jmp 00007FE5151C53DAh 0x0000005a jmp 00007FE5151CE6FEh 0x0000005f xchg eax, ecx 0x00000060 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CCFB85B second address: 000000006CCFB903 instructions: 0x00000000 rdtsc 0x00000002 lea eax, dword ptr [eax+ebx] 0x00000005 jmp 00007FE5150D13DFh 0x00000007 cmp eax, 9DA45E12h 0x0000000c push si 0x0000000e lea esp, dword ptr [esp+02h] 0x00000012 jmp 00007FE5150D142Eh 0x00000014 pop esi 0x00000015 mov al, dl 0x00000017 mov al, dl 0x00000019 clc 0x0000001a jnp 00007FE5150D13E4h 0x0000001c jmp 00007FE5150D1494h 0x00000021 pop ebp 0x00000022 mov ch, 2Fh 0x00000024 mov ax, BE00h 0x00000028 or eax, ebx 0x0000002a jnle 00007FE5150D13C1h 0x0000002c jle 00007FE5150D13A9h 0x0000002e add esp, 04h 0x00000031 jnbe 00007FE5150D142Bh 0x00000033 pushfd 0x00000034 mov cx, word ptr [esp+02h] 0x00000039 jmp 00007FE5150D13E4h 0x0000003b lea edi, dword ptr [ecx+ebx] 0x0000003e mov edi, dword ptr [esp+04h] 0x00000042 mov edx, 6C4C3A78h 0x00000047 push dx 0x00000049 jmp 00007FE5150D1410h 0x0000004b lea esp, dword ptr [esp+02h] 0x0000004f lea esp, dword ptr [esp+08h] 0x00000053 call 00007FE5150D1431h 0x00000058 mov ax, dx 0x0000005b mov cl, B9h 0x0000005d bt dx, bx 0x00000061 xchg dword ptr [esp], ecx 0x00000064 jmp 00007FE5150D13DEh 0x00000066 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CCECBE2 second address: 000000006CCECCAF instructions: 0x00000000 rdtsc 0x00000002 xchg ecx, edx 0x00000004 mov ax, word ptr [esp] 0x00000008 mov edx, B68AAC39h 0x0000000d lea esi, dword ptr [esi-00000052h] 0x00000013 xchg eax, edx 0x00000014 jmp 00007FE5151CE633h 0x00000016 mov edx, ecx 0x00000018 lea eax, dword ptr [00000000h+edi*4] 0x0000001f mov dx, 208Bh 0x00000023 xchg dword ptr [esp+20h], esi 0x00000027 mov cl, ch 0x00000029 xchg dx, ax 0x0000002c jmp 00007FE5151CE5E3h 0x0000002e xchg dx, ax 0x00000031 mov ecx, dword ptr [esp] 0x00000034 push dword ptr [esp+20h] 0x00000038 retn 0024h 0x0000003b mov eax, 12F33EA2h 0x00000040 xor cl, 00000044h 0x00000043 jnl 00007FE5151CE6F0h 0x00000049 jl 00007FE5151CE6CCh 0x0000004f pushfd 0x00000050 mov dx, cx 0x00000053 mov dh, 56h 0x00000055 jmp 00007FE5151CE681h 0x00000057 lea eax, dword ptr [ebx-03h] 0x0000005a lea ecx, dword ptr [ecx-0F5291AAh] 0x00000060 jmp 00007FE5151CE5BDh 0x00000062 lea esp, dword ptr [esp+04h] 0x00000066 sub ebp, 1284C013h 0x0000006c call 00007FE5151CE62Ch 0x00000071 mov ecx, dword ptr [esp] 0x00000074 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CCECBE2 second address: 000000006CCECCAF instructions: 0x00000000 rdtsc 0x00000002 xchg ecx, edx 0x00000004 mov ax, word ptr [esp] 0x00000008 mov edx, B68AAC39h 0x0000000d lea esi, dword ptr [esi-00000052h] 0x00000013 xchg eax, edx 0x00000014 jmp 00007FE5150D1423h 0x00000016 mov edx, ecx 0x00000018 lea eax, dword ptr [00000000h+edi*4] 0x0000001f mov dx, 208Bh 0x00000023 xchg dword ptr [esp+20h], esi 0x00000027 mov cl, ch 0x00000029 xchg dx, ax 0x0000002c jmp 00007FE5150D13D3h 0x0000002e xchg dx, ax 0x00000031 mov ecx, dword ptr [esp] 0x00000034 push dword ptr [esp+20h] 0x00000038 retn 0024h 0x0000003b mov eax, 12F33EA2h 0x00000040 xor cl, 00000044h 0x00000043 jnl 00007FE5150D14E0h 0x00000049 pushfd 0x0000004a mov dx, cx 0x0000004d mov dh, 56h 0x0000004f lea eax, dword ptr [ebx-03h] 0x00000052 lea ecx, dword ptr [ecx-0F5291AAh] 0x00000058 lea esp, dword ptr [esp+04h] 0x0000005c sub ebp, 1284C013h 0x00000062 call 00007FE5150D141Ch 0x00000067 mov ecx, dword ptr [esp] 0x0000006a rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CD3A396 second address: 000000006CD3A359 instructions: 0x00000000 rdtsc 0x00000002 bswap ecx 0x00000004 mov dh, byte ptr [esp] 0x00000007 jmp 00007FE5150D12D8h 0x0000000c add esi, 02h 0x0000000f btr cx, ax 0x00000013 jno 00007FE5150D14DDh 0x00000019 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CD3A359 second address: 000000006CD3A2DB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5151CE561h 0x00000007 not cl 0x00000009 call 00007FE5151CE65Dh 0x0000000e lea edx, dword ptr [00000000h+esi*4] 0x00000015 mov cx, E8B9h 0x00000019 rcl dx, cl 0x0000001c btc cx, ax 0x00000020 xchg al, cl 0x00000022 jmp 00007FE5151CE5D9h 0x00000024 xchg dword ptr [esp], edi 0x00000027 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CD3A2DB second address: 000000006CD3A2D0 instructions: 0x00000000 rdtsc 0x00000002 btc eax, ebx 0x00000005 mov eax, edx 0x00000007 xchg ch, ah 0x00000009 lea edi, dword ptr [edi-0004D459h] 0x0000000f jmp 00007FE5150D13D8h 0x00000011 mov eax, edi 0x00000013 mov dx, EA8Dh 0x00000017 lea ecx, dword ptr [ebx+52h] 0x0000001a xchg dword ptr [esp], edi 0x0000001d bswap edx 0x0000001f rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CD3A2D0 second address: 000000006CCECE3D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5151CE665h 0x00000004 push dword ptr [esp] 0x00000007 retn 0004h 0x0000000a movzx ecx, byte ptr [ebp+00h] 0x0000000e jmp 00007FE5151CE5EFh 0x00000010 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CD49DB9 second address: 000000006CD49ED1 instructions: 0x00000000 rdtsc 0x00000002 setnle cl 0x00000005 setb cl 0x00000008 jmp 00007FE5151CE661h 0x0000000a sub edi, 08h 0x0000000d xchg ch, cl 0x0000000f bsr ecx, ebx 0x00000012 je 00007FE5151CE5F2h 0x00000014 jne 00007FE5151CEE03h 0x0000001a neg ch 0x0000001c jmp 00007FE5151CE4EFh 0x00000021 pushad 0x00000022 xchg eax, esi 0x00000023 sub esp, 0Fh 0x00000026 jbe 00007FE5151CE591h 0x0000002c xchg word ptr [esp+06h], ax 0x00000031 mov dx, 2507h 0x00000035 lea esp, dword ptr [esp+03h] 0x00000039 mov dword ptr [esp+24h], edi 0x0000003d lea esp, dword ptr [esp+0Ch] 0x00000041 jmp 00007FE5151CE01Fh 0x00000046 popad 0x00000047 mov dword ptr [ecx], edx 0x00000049 jmp 00007FE5151CE545h 0x0000004e rcr ch, cl 0x00000050 jbe 00007FE5151CE5F8h 0x00000052 setno ch 0x00000055 jmp 00007FE5151CE650h 0x00000057 mov edx, edi 0x00000059 add edx, 04h 0x0000005c jnl 00007FE5151CE5E3h 0x0000005e jmp 00007FE5151CE5FAh 0x00000060 mov dword ptr [edx], eax 0x00000062 bsf eax, ebp 0x00000065 call 00007FE5151CE623h 0x0000006a pop word ptr [esp] 0x0000006e lea esp, dword ptr [esp+02h] 0x00000072 call 00007FE5151CE616h 0x00000077 jmp 00007FE5151CE64Ch 0x00000079 shl eax, 03h 0x0000007c lea edx, dword ptr [00000000h+ebp*4] 0x00000083 inc cx 0x00000085 lea ecx, dword ptr [eax+edi] 0x00000088 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CD4FABF second address: 000000006CD01849 instructions: 0x00000000 rdtsc 0x00000002 sub esp, 03h 0x00000005 jl 00007FE5150D1437h 0x00000007 mov word ptr [esp], sp 0x0000000b push word ptr [esp+02h] 0x00000010 sub esp, 16h 0x00000013 lea esp, dword ptr [esp+03h] 0x00000017 jmp 00007FE5150D15BAh 0x0000001c sub esi, 08h 0x0000001f pushad 0x00000020 cmc 0x00000021 jl 00007FE5150D1302h 0x00000027 jnl 00007FE5150D12FCh 0x0000002d call 00007FE5150D13E1h 0x00000032 pop dword ptr [esp+10h] 0x00000036 jmp 00007FE5150D13E6h 0x00000038 xchg edx, ecx 0x0000003a clc 0x0000003b jnp 00007FE5150D1419h 0x0000003d jp 00007FE5150D1417h 0x0000003f mov dword ptr [esi], ecx 0x00000041 jmp 00007FE5150D1453h 0x00000043 mov ch, 19h 0x00000045 mov cx, 60D1h 0x00000049 lea ecx, dword ptr [00000000h+ebx*4] 0x00000050 bsr ecx, edi 0x00000053 jle 00007FE5150D13CFh 0x00000055 jnle 00007FE5150D13CDh 0x00000057 jmp 00007FE5150D13EAh 0x00000059 mov ecx, esi 0x0000005b jmp 00007FE5150D1416h 0x0000005d add ecx, 04h 0x00000060 jmp 00007FE5150D144Fh 0x00000062 jne 00007FE5150D13B7h 0x00000064 mov dword ptr [ecx], eax 0x00000066 bswap eax 0x00000068 mov ecx, esi 0x0000006a jmp 00007FE515083086h 0x0000006f rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CD4E930 second address: 000000006CD0504B instructions: 0x00000000 rdtsc 0x00000002 call 00007FE5151CE616h 0x00000007 sub edi, 08h 0x0000000a jmp 00007FE5151CE616h 0x0000000c pushad 0x0000000d lea esp, dword ptr [esp+01h] 0x00000011 add esp, 16h 0x00000014 jo 00007FE5151CF6C5h 0x0000001a pop dword ptr [esp] 0x0000001d jmp 00007FE5151CF79Ah 0x00000022 lea esp, dword ptr [esp+01h] 0x00000026 jmp 00007FE5151CE513h 0x0000002b mov dword ptr [edi], edx 0x0000002d mov dx, cx 0x00000030 setp dh 0x00000033 mov edx, ebx 0x00000035 jmp 00007FE5151CE63Eh 0x00000037 xchg eax, ecx 0x00000038 mov dx, word ptr [esp] 0x0000003c bt edx, edx 0x0000003f jnl 00007FE5151CE5F0h 0x00000041 bt edx, esi 0x00000044 lea edx, dword ptr [00000000h+ebx*4] 0x0000004b jmp 00007FE5151CE648h 0x0000004d mov dword ptr [edi+04h], ecx 0x00000050 bswap ecx 0x00000052 rol cl, 00000006h 0x00000055 jp 00007FE5151CE5EAh 0x00000057 dec ecx 0x00000058 jmp 00007FE515183C2Dh 0x0000005d jmp 00007FE5151CE658h 0x0000005f stc 0x00000060 jnle 00007FE5151CE5C9h 0x00000062 bsf cx, di 0x00000066 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CD4E930 second address: 000000006CD05094 instructions: 0x00000000 rdtsc 0x00000002 call 00007FE5151CE616h 0x00000007 sub edi, 08h 0x0000000a jmp 00007FE5151CE616h 0x0000000c pushad 0x0000000d lea esp, dword ptr [esp+01h] 0x00000011 add esp, 16h 0x00000014 jo 00007FE5151CF6C5h 0x0000001a pop dword ptr [esp] 0x0000001d jmp 00007FE5151CF79Ah 0x00000022 lea esp, dword ptr [esp+01h] 0x00000026 jmp 00007FE5151CE513h 0x0000002b mov dword ptr [edi], edx 0x0000002d mov dx, cx 0x00000030 setp dh 0x00000033 mov edx, ebx 0x00000035 jmp 00007FE5151CE63Eh 0x00000037 xchg eax, ecx 0x00000038 mov dx, word ptr [esp] 0x0000003c bt edx, edx 0x0000003f jnl 00007FE5151CE5F0h 0x00000041 bt edx, esi 0x00000044 lea edx, dword ptr [00000000h+ebx*4] 0x0000004b jmp 00007FE5151CE648h 0x0000004d mov dword ptr [edi+04h], ecx 0x00000050 bswap ecx 0x00000052 rol cl, 00000006h 0x00000055 jp 00007FE5151CE5EAh 0x00000057 jnp 00007FE5151CE5EFh 0x00000059 dec ecx 0x0000005a jmp 00007FE515183C26h 0x0000005f jmp 00007FE5151CE658h 0x00000061 stc 0x00000062 jnle 00007FE5151CE5C9h 0x00000064 bsf cx, di 0x00000068 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CD4E930 second address: 000000006CD0504B instructions: 0x00000000 rdtsc 0x00000002 call 00007FE5150D1406h 0x00000007 sub edi, 08h 0x0000000a jmp 00007FE5150D1406h 0x0000000c pushad 0x0000000d lea esp, dword ptr [esp+01h] 0x00000011 add esp, 16h 0x00000014 jo 00007FE5150D24B5h 0x0000001a pop dword ptr [esp] 0x0000001d jmp 00007FE5150D258Ah 0x00000022 lea esp, dword ptr [esp+01h] 0x00000026 jmp 00007FE5150D1303h 0x0000002b mov dword ptr [edi], edx 0x0000002d mov dx, cx 0x00000030 setp dh 0x00000033 mov edx, ebx 0x00000035 jmp 00007FE5150D142Eh 0x00000037 xchg eax, ecx 0x00000038 mov dx, word ptr [esp] 0x0000003c bt edx, edx 0x0000003f jnl 00007FE5150D13E0h 0x00000041 bt edx, esi 0x00000044 lea edx, dword ptr [00000000h+ebx*4] 0x0000004b jmp 00007FE5150D1438h 0x0000004d mov dword ptr [edi+04h], ecx 0x00000050 bswap ecx 0x00000052 rol cl, 00000006h 0x00000055 jp 00007FE5150D13DAh 0x00000057 jnp 00007FE5150D13DFh 0x00000059 dec ecx 0x0000005a jmp 00007FE515086A16h 0x0000005f jmp 00007FE5150D1448h 0x00000061 stc 0x00000062 jnle 00007FE5150D13B9h 0x00000064 bsf cx, di 0x00000068 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CD3B7D0 second address: 000000006CD3271D instructions: 0x00000000 rdtsc 0x00000002 clc 0x00000003 js 00007FE5151CE71Fh 0x00000009 cmc 0x0000000a cmc 0x0000000b jmp 00007FE5151CE6C9h 0x00000010 sub ebp, 08h 0x00000013 pushad 0x00000014 pop word ptr [esp+05h] 0x00000019 jmp 00007FE5151CE59Ch 0x0000001b lea esp, dword ptr [esp+02h] 0x0000001f xchg edx, ecx 0x00000021 call 00007FE5151CE5F4h 0x00000026 mov word ptr [esp], si 0x0000002a pop word ptr [esp] 0x0000002e lea esp, dword ptr [esp+02h] 0x00000032 jmp 00007FE5151CE641h 0x00000034 mov dword ptr [ebp+00h], ecx 0x00000037 pushfd 0x00000038 neg cx 0x0000003b jnp 00007FE5151CE5EDh 0x0000003d mov cx, word ptr [esp+03h] 0x00000042 lea ecx, dword ptr [edx-000000F7h] 0x00000048 jmp 00007FE5151CE62Ch 0x0000004a mov dword ptr [ebp+04h], eax 0x0000004d mov ax, sp 0x00000050 mov ecx, dword ptr [esp] 0x00000053 jmp 00007FE5151C53DAh 0x00000058 jmp 00007FE5151CE6FEh 0x0000005d xchg eax, ecx 0x0000005e rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe | RDTSC instruction interceptor: First address: 000000006CD3B7D0 second address: 000000006CD3271D instructions: 0x00000000 rdtsc 0x00000002 clc 0x00000003 js 00007FE5150D150Fh 0x00000009 cmc 0x0000000a cmc 0x0000000b jmp 00007FE5150D14B9h 0x00000010 sub ebp, 08h 0x00000013 pushad 0x00000014 pop word ptr [esp+05h] 0x00000019 jmp 00007FE5150D138Ch 0x0000001b lea esp, dword ptr [esp+02h] 0x0000001f xchg edx, ecx 0x00000021 call 00007FE5150D13E4h 0x00000026 mov word ptr [esp], si 0x0000002a pop word ptr [esp] 0x0000002e lea esp, dword ptr [esp+02h] 0x00000032 jmp 00007FE5150D1431h 0x00000034 mov dword ptr [ebp+00h], ecx 0x00000037 pushfd 0x00000038 neg cx 0x0000003b jnp 00007FE5150D13DDh 0x0000003d mov cx, word ptr [esp+03h] 0x00000042 lea ecx, dword ptr [edx-000000F7h] 0x00000048 jmp 00007FE5150D141Ch 0x0000004a mov dword ptr [ebp+04h], eax 0x0000004d mov ax, sp 0x00000050 mov ecx, dword ptr [esp] 0x00000053 jmp 00007FE5150C81CAh 0x00000058 jmp 00007FE5150D14EEh 0x0000005d xchg eax, ecx 0x0000005e rdtsc |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EFF0A4 mov esi, dword ptr fs:[00000030h] | 0_2_00EFF0A4 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EF68A2 mov eax, dword ptr fs:[00000030h] | 0_2_00EF68A2 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EF68A2 mov eax, dword ptr fs:[00000030h] | 0_2_00EF68A2 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EF68A2 mov eax, dword ptr fs:[00000030h] | 0_2_00EF68A2 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EF68A2 mov eax, dword ptr fs:[00000030h] | 0_2_00EF68A2 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EF68A2 mov ecx, dword ptr fs:[00000030h] | 0_2_00EF68A2 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EC806A mov ecx, dword ptr fs:[00000030h] | 0_2_00EC806A |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EC806A mov eax, dword ptr fs:[00000030h] | 0_2_00EC806A |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EF0868 mov eax, dword ptr fs:[00000030h] | 0_2_00EF0868 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EF0868 mov ecx, dword ptr fs:[00000030h] | 0_2_00EF0868 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EC4852 mov eax, dword ptr fs:[00000030h] | 0_2_00EC4852 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EC4852 mov eax, dword ptr fs:[00000030h] | 0_2_00EC4852 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EC7832 mov eax, dword ptr fs:[00000030h] | 0_2_00EC7832 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EC7832 mov eax, dword ptr fs:[00000030h] | 0_2_00EC7832 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EC7832 mov ecx, dword ptr fs:[00000030h] | 0_2_00EC7832 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00ECB832 mov eax, dword ptr fs:[00000030h] | 0_2_00ECB832 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00ECB832 mov eax, dword ptr fs:[00000030h] | 0_2_00ECB832 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00ECB832 mov eax, dword ptr fs:[00000030h] | 0_2_00ECB832 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EEF1E5 mov eax, dword ptr fs:[00000030h] | 0_2_00EEF1E5 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EEF1E5 mov eax, dword ptr fs:[00000030h] | 0_2_00EEF1E5 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EC01F9 mov eax, dword ptr fs:[00000030h] | 0_2_00EC01F9 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EBE9FD mov eax, dword ptr fs:[00000030h] | 0_2_00EBE9FD |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EBE9FD mov ecx, dword ptr fs:[00000030h] | 0_2_00EBE9FD |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EBE9FD mov eax, dword ptr fs:[00000030h] | 0_2_00EBE9FD |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EBE9FD mov eax, dword ptr fs:[00000030h] | 0_2_00EBE9FD |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EBE9FD mov eax, dword ptr fs:[00000030h] | 0_2_00EBE9FD |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EBE9FD mov eax, dword ptr fs:[00000030h] | 0_2_00EBE9FD |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EE69F2 mov eax, dword ptr fs:[00000030h] | 0_2_00EE69F2 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EE69F2 mov eax, dword ptr fs:[00000030h] | 0_2_00EE69F2 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EB49F4 mov eax, dword ptr fs:[00000030h] | 0_2_00EB49F4 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EB49F4 mov eax, dword ptr fs:[00000030h] | 0_2_00EB49F4 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EB49F4 mov eax, dword ptr fs:[00000030h] | 0_2_00EB49F4 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EC79C1 mov eax, dword ptr fs:[00000030h] | 0_2_00EC79C1 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EC79C1 mov eax, dword ptr fs:[00000030h] | 0_2_00EC79C1 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EC79C1 mov ecx, dword ptr fs:[00000030h] | 0_2_00EC79C1 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EBB9B2 mov eax, dword ptr fs:[00000030h] | 0_2_00EBB9B2 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EBB9B2 mov ecx, dword ptr fs:[00000030h] | 0_2_00EBB9B2 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00F0696A mov ecx, dword ptr fs:[00000030h] | 0_2_00F0696A |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00F0696A mov ecx, dword ptr fs:[00000030h] | 0_2_00F0696A |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EBE936 mov ecx, dword ptr fs:[00000030h] | 0_2_00EBE936 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EBE936 mov eax, dword ptr fs:[00000030h] | 0_2_00EBE936 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00ECBAD2 mov eax, dword ptr fs:[00000030h] | 0_2_00ECBAD2 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00F05AB5 mov eax, dword ptr fs:[00000030h] | 0_2_00F05AB5 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00F05AB5 mov ecx, dword ptr fs:[00000030h] | 0_2_00F05AB5 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00F05AB5 mov ecx, dword ptr fs:[00000030h] | 0_2_00F05AB5 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00F12A92 mov eax, dword ptr fs:[00000030h] | 0_2_00F12A92 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00F12A92 mov eax, dword ptr fs:[00000030h] | 0_2_00F12A92 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00F12A92 mov eax, dword ptr fs:[00000030h] | 0_2_00F12A92 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00F12A92 mov eax, dword ptr fs:[00000030h] | 0_2_00F12A92 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EBFA99 mov eax, dword ptr fs:[00000030h] | 0_2_00EBFA99 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EBFA99 mov eax, dword ptr fs:[00000030h] | 0_2_00EBFA99 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EBFA99 mov eax, dword ptr fs:[00000030h] | 0_2_00EBFA99 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EBFA99 mov eax, dword ptr fs:[00000030h] | 0_2_00EBFA99 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EBFA99 mov eax, dword ptr fs:[00000030h] | 0_2_00EBFA99 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EEEA01 mov eax, dword ptr fs:[00000030h] | 0_2_00EEEA01 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EEEA01 mov eax, dword ptr fs:[00000030h] | 0_2_00EEEA01 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EEFBFF mov eax, dword ptr fs:[00000030h] | 0_2_00EEFBFF |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EEFBFF mov eax, dword ptr fs:[00000030h] | 0_2_00EEFBFF |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EFBBCD mov eax, dword ptr fs:[00000030h] | 0_2_00EFBBCD |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EFBBCD mov ecx, dword ptr fs:[00000030h] | 0_2_00EFBBCD |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EB4BAA mov ebx, dword ptr fs:[00000030h] | 0_2_00EB4BAA |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EB4BAA mov eax, dword ptr fs:[00000030h] | 0_2_00EB4BAA |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EB4BAA mov ecx, dword ptr fs:[00000030h] | 0_2_00EB4BAA |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EB4BAA mov eax, dword ptr fs:[00000030h] | 0_2_00EB4BAA |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EE53BA mov eax, dword ptr fs:[00000030h] | 0_2_00EE53BA |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EE53BA mov eax, dword ptr fs:[00000030h] | 0_2_00EE53BA |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EE63B2 cmp dword ptr fs:[00000030h], ebx | 0_2_00EE63B2 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EE63B2 mov eax, dword ptr fs:[00000030h] | 0_2_00EE63B2 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EE63B2 mov eax, dword ptr fs:[00000030h] | 0_2_00EE63B2 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EE63B2 mov eax, dword ptr fs:[00000030h] | 0_2_00EE63B2 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EC6392 mov eax, dword ptr fs:[00000030h] | 0_2_00EC6392 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EC6392 mov eax, dword ptr fs:[00000030h] | 0_2_00EC6392 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EC6392 mov eax, dword ptr fs:[00000030h] | 0_2_00EC6392 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EC6392 mov eax, dword ptr fs:[00000030h] | 0_2_00EC6392 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EF0B48 mov eax, dword ptr fs:[00000030h] | 0_2_00EF0B48 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EF0B48 mov ecx, dword ptr fs:[00000030h] | 0_2_00EF0B48 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EE4CEE mov eax, dword ptr fs:[00000030h] | 0_2_00EE4CEE |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EFBCF9 mov eax, dword ptr fs:[00000030h] | 0_2_00EFBCF9 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EFBCF9 mov eax, dword ptr fs:[00000030h] | 0_2_00EFBCF9 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EFBCF9 mov eax, dword ptr fs:[00000030h] | 0_2_00EFBCF9 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EFBCF9 mov eax, dword ptr fs:[00000030h] | 0_2_00EFBCF9 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EFBCF9 mov ecx, dword ptr fs:[00000030h] | 0_2_00EFBCF9 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EFCCC8 mov eax, dword ptr fs:[00000030h] | 0_2_00EFCCC8 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EFCCC8 mov ecx, dword ptr fs:[00000030h] | 0_2_00EFCCC8 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EFCCC8 mov eax, dword ptr fs:[00000030h] | 0_2_00EFCCC8 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EBD4C2 mov eax, dword ptr fs:[00000030h] | 0_2_00EBD4C2 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00F05CCC mov eax, dword ptr fs:[00000030h] | 0_2_00F05CCC |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00F05CCC mov ecx, dword ptr fs:[00000030h] | 0_2_00F05CCC |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00F05CCC mov ecx, dword ptr fs:[00000030h] | 0_2_00F05CCC |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EB6482 mov eax, dword ptr fs:[00000030h] | 0_2_00EB6482 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EB6482 mov eax, dword ptr fs:[00000030h] | 0_2_00EB6482 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EB6482 mov eax, dword ptr fs:[00000030h] | 0_2_00EB6482 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EE5490 mov eax, dword ptr fs:[00000030h] | 0_2_00EE5490 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EE5490 mov ecx, dword ptr fs:[00000030h] | 0_2_00EE5490 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EC4472 mov eax, dword ptr fs:[00000030h] | 0_2_00EC4472 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EC4472 mov eax, dword ptr fs:[00000030h] | 0_2_00EC4472 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EF0428 mov eax, dword ptr fs:[00000030h] | 0_2_00EF0428 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00F12C24 mov eax, dword ptr fs:[00000030h] | 0_2_00F12C24 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EC45F2 mov eax, dword ptr fs:[00000030h] | 0_2_00EC45F2 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EC45F2 mov eax, dword ptr fs:[00000030h] | 0_2_00EC45F2 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00ECBDC9 mov eax, dword ptr fs:[00000030h] | 0_2_00ECBDC9 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EE6DD6 mov eax, dword ptr fs:[00000030h] | 0_2_00EE6DD6 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EE6DD6 mov eax, dword ptr fs:[00000030h] | 0_2_00EE6DD6 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00F12DCE mov eax, dword ptr fs:[00000030h] | 0_2_00F12DCE |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EB75A2 mov eax, dword ptr fs:[00000030h] | 0_2_00EB75A2 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EFCDA4 mov eax, dword ptr fs:[00000030h] | 0_2_00EFCDA4 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EC6598 mov eax, dword ptr fs:[00000030h] | 0_2_00EC6598 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EC6598 mov eax, dword ptr fs:[00000030h] | 0_2_00EC6598 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EC8592 mov eax, dword ptr fs:[00000030h] | 0_2_00EC8592 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EC8592 mov eax, dword ptr fs:[00000030h] | 0_2_00EC8592 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EC8592 mov eax, dword ptr fs:[00000030h] | 0_2_00EC8592 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EC8592 mov eax, dword ptr fs:[00000030h] | 0_2_00EC8592 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EC8592 mov eax, dword ptr fs:[00000030h] | 0_2_00EC8592 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EC8592 mov eax, dword ptr fs:[00000030h] | 0_2_00EC8592 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EC6D2E mov eax, dword ptr fs:[00000030h] | 0_2_00EC6D2E |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EC6D2E mov eax, dword ptr fs:[00000030h] | 0_2_00EC6D2E |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EC6D2E mov eax, dword ptr fs:[00000030h] | 0_2_00EC6D2E |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EF652C mov eax, dword ptr fs:[00000030h] | 0_2_00EF652C |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EF652C mov ecx, dword ptr fs:[00000030h] | 0_2_00EF652C |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EC6530 mov eax, dword ptr fs:[00000030h] | 0_2_00EC6530 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EC6530 mov eax, dword ptr fs:[00000030h] | 0_2_00EC6530 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EC6530 mov eax, dword ptr fs:[00000030h] | 0_2_00EC6530 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EC6530 mov eax, dword ptr fs:[00000030h] | 0_2_00EC6530 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EC7EC1 mov ecx, dword ptr fs:[00000030h] | 0_2_00EC7EC1 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EC7EC1 mov eax, dword ptr fs:[00000030h] | 0_2_00EC7EC1 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00F066C2 mov eax, dword ptr fs:[00000030h] | 0_2_00F066C2 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00F066C2 mov ecx, dword ptr fs:[00000030h] | 0_2_00F066C2 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00F066C2 mov ecx, dword ptr fs:[00000030h] | 0_2_00F066C2 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EC46A6 mov eax, dword ptr fs:[00000030h] | 0_2_00EC46A6 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EC46A6 mov eax, dword ptr fs:[00000030h] | 0_2_00EC46A6 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EC76B9 mov eax, dword ptr fs:[00000030h] | 0_2_00EC76B9 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EC76B9 mov eax, dword ptr fs:[00000030h] | 0_2_00EC76B9 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EB5672 mov ecx, dword ptr fs:[00000030h] | 0_2_00EB5672 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EC9E77 mov eax, dword ptr fs:[00000030h] | 0_2_00EC9E77 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EC9E77 mov eax, dword ptr fs:[00000030h] | 0_2_00EC9E77 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EC9E77 mov eax, dword ptr fs:[00000030h] | 0_2_00EC9E77 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EC9E77 mov eax, dword ptr fs:[00000030h] | 0_2_00EC9E77 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EC9E77 mov eax, dword ptr fs:[00000030h] | 0_2_00EC9E77 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EC9E77 mov eax, dword ptr fs:[00000030h] | 0_2_00EC9E77 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EC5E72 mov eax, dword ptr fs:[00000030h] | 0_2_00EC5E72 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EC5E72 mov eax, dword ptr fs:[00000030h] | 0_2_00EC5E72 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EC5E72 mov eax, dword ptr fs:[00000030h] | 0_2_00EC5E72 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EC5E72 mov eax, dword ptr fs:[00000030h] | 0_2_00EC5E72 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EEDE22 mov eax, dword ptr fs:[00000030h] | 0_2_00EEDE22 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EEDE22 mov eax, dword ptr fs:[00000030h] | 0_2_00EEDE22 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EE4E20 mov eax, dword ptr fs:[00000030h] | 0_2_00EE4E20 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00ECBE22 mov eax, dword ptr fs:[00000030h] | 0_2_00ECBE22 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00ECBE22 mov eax, dword ptr fs:[00000030h] | 0_2_00ECBE22 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00ECBE22 mov eax, dword ptr fs:[00000030h] | 0_2_00ECBE22 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00F03628 mov eax, dword ptr fs:[00000030h] | 0_2_00F03628 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00F03628 mov ecx, dword ptr fs:[00000030h] | 0_2_00F03628 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EB47EF mov eax, dword ptr fs:[00000030h] | 0_2_00EB47EF |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EB47EF mov eax, dword ptr fs:[00000030h] | 0_2_00EB47EF |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EB4FE2 mov eax, dword ptr fs:[00000030h] | 0_2_00EB4FE2 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EB4FE2 mov ecx, dword ptr fs:[00000030h] | 0_2_00EB4FE2 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EB4FE2 mov eax, dword ptr fs:[00000030h] | 0_2_00EB4FE2 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EB7FF9 mov eax, dword ptr fs:[00000030h] | 0_2_00EB7FF9 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EB7FF9 mov eax, dword ptr fs:[00000030h] | 0_2_00EB7FF9 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EB7FF9 mov eax, dword ptr fs:[00000030h] | 0_2_00EB7FF9 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EC47AE mov eax, dword ptr fs:[00000030h] | 0_2_00EC47AE |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EEDFA8 mov eax, dword ptr fs:[00000030h] | 0_2_00EEDFA8 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EEDFA8 mov ecx, dword ptr fs:[00000030h] | 0_2_00EEDFA8 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EEF7B3 mov eax, dword ptr fs:[00000030h] | 0_2_00EEF7B3 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EEF7B3 mov eax, dword ptr fs:[00000030h] | 0_2_00EEF7B3 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EEF7B3 mov eax, dword ptr fs:[00000030h] | 0_2_00EEF7B3 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00F08F94 mov eax, dword ptr fs:[00000030h] | 0_2_00F08F94 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00F08F94 mov ecx, dword ptr fs:[00000030h] | 0_2_00F08F94 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EB6782 mov eax, dword ptr fs:[00000030h] | 0_2_00EB6782 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EB6782 mov ecx, dword ptr fs:[00000030h] | 0_2_00EB6782 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EB6782 mov eax, dword ptr fs:[00000030h] | 0_2_00EB6782 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EC4F82 mov eax, dword ptr fs:[00000030h] | 0_2_00EC4F82 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EC4F82 mov eax, dword ptr fs:[00000030h] | 0_2_00EC4F82 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EE679A mov eax, dword ptr fs:[00000030h] | 0_2_00EE679A |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EE679A mov eax, dword ptr fs:[00000030h] | 0_2_00EE679A |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EC6F2C mov eax, dword ptr fs:[00000030h] | 0_2_00EC6F2C |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EC6F2C mov eax, dword ptr fs:[00000030h] | 0_2_00EC6F2C |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EC6F2C mov eax, dword ptr fs:[00000030h] | 0_2_00EC6F2C |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EC6F2C mov eax, dword ptr fs:[00000030h] | 0_2_00EC6F2C |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EFA735 mov eax, dword ptr fs:[00000030h] | 0_2_00EFA735 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EB5702 mov eax, dword ptr fs:[00000030h] | 0_2_00EB5702 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EB5702 mov ecx, dword ptr fs:[00000030h] | 0_2_00EB5702 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EB4702 mov eax, dword ptr fs:[00000030h] | 0_2_00EB4702 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EEFF1E mov eax, dword ptr fs:[00000030h] | 0_2_00EEFF1E |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_00EEFF1E mov eax, dword ptr fs:[00000030h] | 0_2_00EEFF1E |