Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A3C110 | 0_2_00A3C110 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A3E2DB | 0_2_00A3E2DB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A68440 | 0_2_00A68440 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A3B95B | 0_2_00A3B95B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A39FC0 | 0_2_00A39FC0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00ABD0AA | 0_2_00ABD0AA |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A330A0 | 0_2_00A330A0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A680A0 | 0_2_00A680A0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AE8089 | 0_2_00AE8089 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AF8090 | 0_2_00AF8090 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AE30EF | 0_2_00AE30EF |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AD20E8 | 0_2_00AD20E8 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AC50E5 | 0_2_00AC50E5 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B0A0E3 | 0_2_00B0A0E3 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A580FF | 0_2_00A580FF |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AF50F5 | 0_2_00AF50F5 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AE20F5 | 0_2_00AE20F5 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AB80DA | 0_2_00AB80DA |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A6F0D0 | 0_2_00A6F0D0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AF7028 | 0_2_00AF7028 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A9C006 | 0_2_00A9C006 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00ADE013 | 0_2_00ADE013 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A99016 | 0_2_00A99016 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B01079 | 0_2_00B01079 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00ABF061 | 0_2_00ABF061 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00ADB060 | 0_2_00ADB060 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AAF071 | 0_2_00AAF071 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AC104A | 0_2_00AC104A |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B11058 | 0_2_00B11058 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AB61AE | 0_2_00AB61AE |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AC01A5 | 0_2_00AC01A5 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B0E1AA | 0_2_00B0E1AA |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BFD19F | 0_2_00BFD19F |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C021E0 | 0_2_00C021E0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AE0198 | 0_2_00AE0198 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A5719F | 0_2_00A5719F |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AF21E2 | 0_2_00AF21E2 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B051E3 | 0_2_00B051E3 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A3F1F6 | 0_2_00A3F1F6 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A6F1F0 | 0_2_00A6F1F0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AAA1CA | 0_2_00AAA1CA |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AA7129 | 0_2_00AA7129 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AC3128 | 0_2_00AC3128 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A98125 | 0_2_00A98125 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AFE138 | 0_2_00AFE138 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AE9136 | 0_2_00AE9136 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B10113 | 0_2_00B10113 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A95101 | 0_2_00A95101 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B06101 | 0_2_00B06101 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A49113 | 0_2_00A49113 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A45F12 | 0_2_00A45F12 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AC9163 | 0_2_00AC9163 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AD517F | 0_2_00AD517F |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A55140 | 0_2_00A55140 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AD114B | 0_2_00AD114B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AB4140 | 0_2_00AB4140 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B0015B | 0_2_00B0015B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A57149 | 0_2_00A57149 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AB9145 | 0_2_00AB9145 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AB115B | 0_2_00AB115B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AF115F | 0_2_00AF115F |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A67154 | 0_2_00A67154 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A9E15D | 0_2_00A9E15D |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B0C14B | 0_2_00B0C14B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B032BF | 0_2_00B032BF |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AB92B9 | 0_2_00AB92B9 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00ADC2B9 | 0_2_00ADC2B9 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AE72BA | 0_2_00AE72BA |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A4D280 | 0_2_00A4D280 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AFD287 | 0_2_00AFD287 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00ABA280 | 0_2_00ABA280 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AAD2EC | 0_2_00AAD2EC |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AA52E2 | 0_2_00AA52E2 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AE52CC | 0_2_00AE52CC |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B112C3 | 0_2_00B112C3 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A6F2D0 | 0_2_00A6F2D0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00ABB2DC | 0_2_00ABB2DC |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AD62DA | 0_2_00AD62DA |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AFF2D5 | 0_2_00AFF2D5 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B0223A | 0_2_00B0223A |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A34F60 | 0_2_00A34F60 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AB0204 | 0_2_00AB0204 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AA121C | 0_2_00AA121C |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AA0269 | 0_2_00AA0269 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A9F26D | 0_2_00A9F26D |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AE426A | 0_2_00AE426A |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AF927A | 0_2_00AF927A |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AFB275 | 0_2_00AFB275 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B0826B | 0_2_00B0826B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A9B275 | 0_2_00A9B275 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00ACE24E | 0_2_00ACE24E |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AEE259 | 0_2_00AEE259 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AF0250 | 0_2_00AF0250 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AF4388 | 0_2_00AF4388 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00ACB384 | 0_2_00ACB384 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A69397 | 0_2_00A69397 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A5D398 | 0_2_00A5D398 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AB53EC | 0_2_00AB53EC |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AAE3CB | 0_2_00AAE3CB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B0B3D6 | 0_2_00B0B3D6 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C0C3AD | 0_2_00C0C3AD |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00ABA3C5 | 0_2_00ABA3C5 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AAC334 | 0_2_00AAC334 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AD5305 | 0_2_00AD5305 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AD431A | 0_2_00AD431A |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B16308 | 0_2_00B16308 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AC6317 | 0_2_00AC6317 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A56369 | 0_2_00A56369 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AE937E | 0_2_00AE937E |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B14361 | 0_2_00B14361 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AFA35A | 0_2_00AFA35A |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AD0354 | 0_2_00AD0354 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B0C4B0 | 0_2_00B0C4B0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AF04A6 | 0_2_00AF04A6 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AD24A1 | 0_2_00AD24A1 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AF64BD | 0_2_00AF64BD |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AD44B3 | 0_2_00AD44B3 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AEA48E | 0_2_00AEA48E |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AE8486 | 0_2_00AE8486 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A96480 | 0_2_00A96480 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B0B49F | 0_2_00B0B49F |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00ACF4E0 | 0_2_00ACF4E0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AED4FB | 0_2_00AED4FB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A984CF | 0_2_00A984CF |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AE04C3 | 0_2_00AE04C3 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A42422 | 0_2_00A42422 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A4742C | 0_2_00A4742C |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AC5427 | 0_2_00AC5427 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AA743C | 0_2_00AA743C |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AC8430 | 0_2_00AC8430 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A9E419 | 0_2_00A9E419 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A36410 | 0_2_00A36410 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00ABF417 | 0_2_00ABF417 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AEF463 | 0_2_00AEF463 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BC9454 | 0_2_00BC9454 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A5B455 | 0_2_00A5B455 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AB85AE | 0_2_00AB85AE |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A945A5 | 0_2_00A945A5 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AC55BF | 0_2_00AC55BF |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A495B0 | 0_2_00A495B0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AF15B8 | 0_2_00AF15B8 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AA8589 | 0_2_00AA8589 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AE2589 | 0_2_00AE2589 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BF8590 | 0_2_00BF8590 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C055FF | 0_2_00C055FF |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AB65EA | 0_2_00AB65EA |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B005F7 | 0_2_00B005F7 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AF75F8 | 0_2_00AF75F8 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AC25F2 | 0_2_00AC25F2 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AA95C7 | 0_2_00AA95C7 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AF55DB | 0_2_00AF55DB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B08532 | 0_2_00B08532 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AAF518 | 0_2_00AAF518 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AC0514 | 0_2_00AC0514 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AC3514 | 0_2_00AC3514 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A99516 | 0_2_00A99516 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AF956A | 0_2_00AF956A |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A70560 | 0_2_00A70560 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00ABF577 | 0_2_00ABF577 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B1056C | 0_2_00B1056C |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B0E550 | 0_2_00B0E550 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A53540 | 0_2_00A53540 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AE355F | 0_2_00AE355F |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AD1553 | 0_2_00AD1553 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AB26A9 | 0_2_00AB26A9 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B146BA | 0_2_00B146BA |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B606A6 | 0_2_00B606A6 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00ADC6BA | 0_2_00ADC6BA |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AB16B3 | 0_2_00AB16B3 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A666BA | 0_2_00A666BA |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B0D690 | 0_2_00B0D690 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A3C680 | 0_2_00A3C680 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AB968F | 0_2_00AB968F |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AA4681 | 0_2_00AA4681 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A6F690 | 0_2_00A6F690 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AD46EF | 0_2_00AD46EF |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AAE6FA | 0_2_00AAE6FA |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AD66C4 | 0_2_00AD66C4 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A9D6DE | 0_2_00A9D6DE |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00ADA6D4 | 0_2_00ADA6D4 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00ABE6D7 | 0_2_00ABE6D7 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AC96D0 | 0_2_00AC96D0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00ABB623 | 0_2_00ABB623 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AEE625 | 0_2_00AEE625 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B02601 | 0_2_00B02601 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AA6616 | 0_2_00AA6616 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AA0617 | 0_2_00AA0617 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B1560F | 0_2_00B1560F |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AFC661 | 0_2_00AFC661 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AA267D | 0_2_00AA267D |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AD2674 | 0_2_00AD2674 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B1666E | 0_2_00B1666E |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AA164C | 0_2_00AA164C |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AF3651 | 0_2_00AF3651 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A9B7AD | 0_2_00A9B7AD |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AAF7A6 | 0_2_00AAF7A6 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BB1798 | 0_2_00BB1798 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00ACB788 | 0_2_00ACB788 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AC878B | 0_2_00AC878B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AEC781 | 0_2_00AEC781 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B067F9 | 0_2_00B067F9 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B0F7FB | 0_2_00B0F7FB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A707F0 | 0_2_00A707F0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C00799 | 0_2_00C00799 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A5C7F9 | 0_2_00A5C7F9 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AE87F0 | 0_2_00AE87F0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B157D8 | 0_2_00B157D8 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00ADD7DD | 0_2_00ADD7DD |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A537D0 | 0_2_00A537D0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00ACF7D9 | 0_2_00ACF7D9 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A587D9 | 0_2_00A587D9 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A9672D | 0_2_00A9672D |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AC772A | 0_2_00AC772A |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AE1729 | 0_2_00AE1729 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AB7735 | 0_2_00AB7735 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AB0711 | 0_2_00AB0711 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AD9713 | 0_2_00AD9713 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A67760 | 0_2_00A67760 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AFE768 | 0_2_00AFE768 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A45768 | 0_2_00A45768 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AE974E | 0_2_00AE974E |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BFB756 | 0_2_00BFB756 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A6B8B0 | 0_2_00A6B8B0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B098A6 | 0_2_00B098A6 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A46882 | 0_2_00A46882 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AA2896 | 0_2_00AA2896 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00ADB8F3 | 0_2_00ADB8F3 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A3A8C0 | 0_2_00A3A8C0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A5B8DE | 0_2_00A5B8DE |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AFF8D2 | 0_2_00AFF8D2 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B0C8CE | 0_2_00B0C8CE |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00ACA83E | 0_2_00ACA83E |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B07811 | 0_2_00B07811 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AAD81E | 0_2_00AAD81E |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AC1813 | 0_2_00AC1813 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BF687C | 0_2_00BF687C |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AF4868 | 0_2_00AF4868 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A5B455 | 0_2_00A5B455 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A5587F | 0_2_00A5587F |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A97840 | 0_2_00A97840 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A5B859 | 0_2_00A5B859 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B1184D | 0_2_00B1184D |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AE29A6 | 0_2_00AE29A6 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AFC9B8 | 0_2_00AFC9B8 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A469B8 | 0_2_00A469B8 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A5398C | 0_2_00A5398C |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00ABD982 | 0_2_00ABD982 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AFD997 | 0_2_00AFD997 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A4B998 | 0_2_00A4B998 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AE39EE | 0_2_00AE39EE |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B089E5 | 0_2_00B089E5 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AEB9F9 | 0_2_00AEB9F9 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A679C0 | 0_2_00A679C0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00ADE9C1 | 0_2_00ADE9C1 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AAA9D8 | 0_2_00AAA9D8 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AD99D7 | 0_2_00AD99D7 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AB8922 | 0_2_00AB8922 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AE9920 | 0_2_00AE9920 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B12922 | 0_2_00B12922 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AFA935 | 0_2_00AFA935 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AA890D | 0_2_00AA890D |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AF8901 | 0_2_00AF8901 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A56962 | 0_2_00A56962 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C0A910 | 0_2_00C0A910 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A42940 | 0_2_00A42940 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00ADC945 | 0_2_00ADC945 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AAC940 | 0_2_00AAC940 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AB3952 | 0_2_00AB3952 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A9F950 | 0_2_00A9F950 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A33AA0 | 0_2_00A33AA0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AE0ABA | 0_2_00AE0ABA |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AC8AB4 | 0_2_00AC8AB4 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A55ABE | 0_2_00A55ABE |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A57A83 | 0_2_00A57A83 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AEEA95 | 0_2_00AEEA95 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A51AF0 | 0_2_00A51AF0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AFBAFA | 0_2_00AFBAFA |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A70AC0 | 0_2_00A70AC0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A96AD3 | 0_2_00A96AD3 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AC4A2E | 0_2_00AC4A2E |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B02A2D | 0_2_00B02A2D |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AD8A05 | 0_2_00AD8A05 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A4DA10 | 0_2_00A4DA10 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AD3A61 | 0_2_00AD3A61 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A35A73 | 0_2_00A35A73 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AC0A7F | 0_2_00AC0A7F |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AE5A74 | 0_2_00AE5A74 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AA3A76 | 0_2_00AA3A76 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A9CA4E | 0_2_00A9CA4E |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AABA4D | 0_2_00AABA4D |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00ACFBA9 | 0_2_00ACFBA9 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00ADABBD | 0_2_00ADABBD |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B11BA6 | 0_2_00B11BA6 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A41BB8 | 0_2_00A41BB8 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AC3B81 | 0_2_00AC3B81 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C03BF6 | 0_2_00C03BF6 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B04B8F | 0_2_00B04B8F |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AE5BFF | 0_2_00AE5BFF |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AE7BFD | 0_2_00AE7BFD |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B16BD3 | 0_2_00B16BD3 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A94BD9 | 0_2_00A94BD9 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AF2B2D | 0_2_00AF2B2D |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B0DB35 | 0_2_00B0DB35 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AADB27 | 0_2_00AADB27 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AA4B01 | 0_2_00AA4B01 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AAEB19 | 0_2_00AAEB19 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AE6B1A | 0_2_00AE6B1A |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AC7B1B | 0_2_00AC7B1B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B10B08 | 0_2_00B10B08 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AD2B61 | 0_2_00AD2B61 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AD0B62 | 0_2_00AD0B62 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AA0B7D | 0_2_00AA0B7D |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00ADCB4A | 0_2_00ADCB4A |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AFEB48 | 0_2_00AFEB48 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A68CA0 | 0_2_00A68CA0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00ADDCB8 | 0_2_00ADDCB8 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A5CCBF | 0_2_00A5CCBF |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A35C82 | 0_2_00A35C82 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BFEC9C | 0_2_00BFEC9C |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00ACBC86 | 0_2_00ACBC86 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A9EC96 | 0_2_00A9EC96 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00ACCCE8 | 0_2_00ACCCE8 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A38CF0 | 0_2_00A38CF0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A55CF0 | 0_2_00A55CF0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AE4CF8 | 0_2_00AE4CF8 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AACCC5 | 0_2_00AACCC5 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B11CC4 | 0_2_00B11CC4 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AFFCD5 | 0_2_00AFFCD5 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AB3C2E | 0_2_00AB3C2E |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AF5C25 | 0_2_00AF5C25 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A60C30 | 0_2_00A60C30 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AF3C15 | 0_2_00AF3C15 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00ABEC15 | 0_2_00ABEC15 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AA3C69 | 0_2_00AA3C69 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A4DC60 | 0_2_00A4DC60 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AAFC61 | 0_2_00AAFC61 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BD6C71 | 0_2_00BD6C71 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00ABAC65 | 0_2_00ABAC65 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AECC7D | 0_2_00AECC7D |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A59C50 | 0_2_00A59C50 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A5BC5F | 0_2_00A5BC5F |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AD1C53 | 0_2_00AD1C53 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A99DAF | 0_2_00A99DAF |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00ACADBE | 0_2_00ACADBE |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00ADBDB1 | 0_2_00ADBDB1 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AFAD93 | 0_2_00AFAD93 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A6EDF0 | 0_2_00A6EDF0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B09D38 | 0_2_00B09D38 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A56D2A | 0_2_00A56D2A |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A5FD36 | 0_2_00A5FD36 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AE9D0E | 0_2_00AE9D0E |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AFCD0F | 0_2_00AFCD0F |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A32D00 | 0_2_00A32D00 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BD4D17 | 0_2_00BD4D17 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A57D0A | 0_2_00A57D0A |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AA9D68 | 0_2_00AA9D68 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AE6D6D | 0_2_00AE6D6D |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AC2D64 | 0_2_00AC2D64 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00ADFD65 | 0_2_00ADFD65 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00ABBD60 | 0_2_00ABBD60 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AF0D64 | 0_2_00AF0D64 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AA6D4E | 0_2_00AA6D4E |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A3AD50 | 0_2_00A3AD50 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AB1D5D | 0_2_00AB1D5D |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B0EEB2 | 0_2_00B0EEB2 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AEDEBC | 0_2_00AEDEBC |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AD2EBE | 0_2_00AD2EBE |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AEEEBA | 0_2_00AEEEBA |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AFEEB2 | 0_2_00AFEEB2 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A95EB6 | 0_2_00A95EB6 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B01E97 | 0_2_00B01E97 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AF8E9C | 0_2_00AF8E9C |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AC6E93 | 0_2_00AC6E93 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A9CEF9 | 0_2_00A9CEF9 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00ADAEFF | 0_2_00ADAEFF |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AF2EF1 | 0_2_00AF2EF1 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A4BEC0 | 0_2_00A4BEC0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A4EEC0 | 0_2_00A4EEC0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AE8ECB | 0_2_00AE8ECB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A6AEC0 | 0_2_00A6AEC0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A96EDE | 0_2_00A96EDE |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A52E20 | 0_2_00A52E20 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B0CE28 | 0_2_00B0CE28 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A9EE00 | 0_2_00A9EE00 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B0DE19 | 0_2_00B0DE19 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AB2E01 | 0_2_00AB2E01 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AFBE04 | 0_2_00AFBE04 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BF4E12 | 0_2_00BF4E12 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AC8E17 | 0_2_00AC8E17 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A46E62 | 0_2_00A46E62 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AB9E6C | 0_2_00AB9E6C |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B12E76 | 0_2_00B12E76 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A9AE79 | 0_2_00A9AE79 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AA9E48 | 0_2_00AA9E48 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A60E40 | 0_2_00A60E40 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B0BE45 | 0_2_00B0BE45 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AD5FA0 | 0_2_00AD5FA0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AD6FA0 | 0_2_00AD6FA0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AA9F82 | 0_2_00AA9F82 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AE5F9B | 0_2_00AE5F9B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B15F88 | 0_2_00B15F88 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A58FE0 | 0_2_00A58FE0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A6BFE0 | 0_2_00A6BFE0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B14FF7 | 0_2_00B14FF7 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B06FFA | 0_2_00B06FFA |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AD7FF4 | 0_2_00AD7FF4 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00ABBFCB | 0_2_00ABBFCB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AC7FCA | 0_2_00AC7FCA |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AF9FC8 | 0_2_00AF9FC8 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AB2FD6 | 0_2_00AB2FD6 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AF3F2C | 0_2_00AF3F2C |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AA1F3E | 0_2_00AA1F3E |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B02F2B | 0_2_00B02F2B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AABF36 | 0_2_00AABF36 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AF1F33 | 0_2_00AF1F33 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00ACDF09 | 0_2_00ACDF09 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A62F00 | 0_2_00A62F00 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00ABCF07 | 0_2_00ABCF07 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A45F12 | 0_2_00A45F12 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A34F60 | 0_2_00A34F60 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AD1F6E | 0_2_00AD1F6E |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AEBF69 | 0_2_00AEBF69 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AB4F60 | 0_2_00AB4F60 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A50F70 | 0_2_00A50F70 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AADF4B | 0_2_00AADF4B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A48F57 | 0_2_00A48F57 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A4CF50 | 0_2_00A4CF50 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00A6EF50 | 0_2_00A6EF50 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B16F48 | 0_2_00B16F48 |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C10680 second address: C10693 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FC83CC6159Ch 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C107C2 second address: C107CC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007FC83CBF9996h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C10A60 second address: C10A66 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C133AB second address: C133B5 instructions: 0x00000000 rdtsc 0x00000002 jc 00007FC83CBF999Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C133B5 second address: C133EA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 pushad 0x00000008 jmp 00007FC83CC615A0h 0x0000000d pushad 0x0000000e jp 00007FC83CC61596h 0x00000014 jmp 00007FC83CC6159Bh 0x00000019 popad 0x0000001a popad 0x0000001b mov eax, dword ptr [esp+04h] 0x0000001f pushad 0x00000020 push eax 0x00000021 push edx 0x00000022 push edi 0x00000023 pop edi 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C133EA second address: C133F7 instructions: 0x00000000 rdtsc 0x00000002 je 00007FC83CBF9996h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C133F7 second address: C13440 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC83CC615A9h 0x00000009 popad 0x0000000a popad 0x0000000b mov eax, dword ptr [eax] 0x0000000d push esi 0x0000000e pushad 0x0000000f jmp 00007FC83CC615A9h 0x00000014 push esi 0x00000015 pop esi 0x00000016 popad 0x00000017 pop esi 0x00000018 mov dword ptr [esp+04h], eax 0x0000001c pushad 0x0000001d push eax 0x0000001e push edx 0x0000001f push ebx 0x00000020 pop ebx 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C13440 second address: C13460 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC83CBF99A9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C13460 second address: C13466 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C13759 second address: C13789 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push esi 0x00000004 pop esi 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr [esp+04h] 0x0000000c jmp 00007FC83CBF999Fh 0x00000011 mov eax, dword ptr [eax] 0x00000013 jc 00007FC83CBF999Ah 0x00000019 push esi 0x0000001a push edi 0x0000001b pop edi 0x0000001c pop esi 0x0000001d mov dword ptr [esp+04h], eax 0x00000021 push eax 0x00000022 push edx 0x00000023 pushad 0x00000024 push eax 0x00000025 push edx 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C13789 second address: C13794 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007FC83CC61596h 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C13794 second address: C1379A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C1379A second address: C1379E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C335CD second address: C335E1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jno 00007FC83CBF999Eh 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C3377C second address: C3378E instructions: 0x00000000 rdtsc 0x00000002 jg 00007FC83CC61596h 0x00000008 push esi 0x00000009 pop esi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push esi 0x0000000d push ecx 0x0000000e pop ecx 0x0000000f push eax 0x00000010 pop eax 0x00000011 pop esi 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C3378E second address: C33795 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push esi 0x00000004 pop esi 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C3393A second address: C3393E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C33C03 second address: C33C1B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ebx 0x00000007 js 00007FC83CBF9996h 0x0000000d jmp 00007FC83CBF999Ah 0x00000012 pop ebx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C3404C second address: C34070 instructions: 0x00000000 rdtsc 0x00000002 jng 00007FC83CC61596h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b jns 00007FC83CC6159Ah 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007FC83CC6159Dh 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C341BC second address: C341C2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C341C2 second address: C341D6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC83CC615A0h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C341D6 second address: C341E0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C341E0 second address: C341E4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C3460D second address: C34613 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C2B7E9 second address: C2B7FB instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pushad 0x00000004 popad 0x00000005 jnc 00007FC83CC61596h 0x0000000b pop edx 0x0000000c pop edx 0x0000000d pop eax 0x0000000e pushad 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C2B7FB second address: C2B82B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007FC83CBF99A1h 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FC83CBF99A4h 0x00000013 pushad 0x00000014 popad 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C2B82B second address: C2B84E instructions: 0x00000000 rdtsc 0x00000002 ja 00007FC83CC61596h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b jmp 00007FC83CC615A6h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C2B84E second address: C2B86C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 jmp 00007FC83CBF99A4h 0x0000000b popad 0x0000000c push ecx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C3474F second address: C3477B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a popad 0x0000000b jnc 00007FC83CC61596h 0x00000011 pop eax 0x00000012 popad 0x00000013 pushad 0x00000014 pushad 0x00000015 jmp 00007FC83CC615A3h 0x0000001a pushad 0x0000001b popad 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C34CDA second address: C34CE6 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pushad 0x00000004 popad 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push edi 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C34CE6 second address: C34D04 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007FC83CC61596h 0x0000000a pop edi 0x0000000b pushad 0x0000000c jmp 00007FC83CC615A0h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C34D04 second address: C34D0A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C34D0A second address: C34D13 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C34D13 second address: C34D17 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C350F4 second address: C35110 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 jmp 00007FC83CC615A5h 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C35110 second address: C35118 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C35118 second address: C3511C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C3511C second address: C35129 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 pushad 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: BFB28B second address: BFB29F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC83CC6159Bh 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c push edx 0x0000000d pop edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: BFB29F second address: BFB2BC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC83CBF99A7h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C3DC3E second address: C3DC4D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 mov eax, dword ptr [esp+04h] 0x00000009 push eax 0x0000000a push edx 0x0000000b push esi 0x0000000c push eax 0x0000000d pop eax 0x0000000e pop esi 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C3DC4D second address: C3DC70 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 pushad 0x00000006 popad 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov eax, dword ptr [eax] 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FC83CBF99A5h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C3DC70 second address: C3DC8B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edx 0x00000004 pop edx 0x00000005 jmp 00007FC83CC6159Bh 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d mov dword ptr [esp+04h], eax 0x00000011 pushad 0x00000012 pushad 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C3DDE5 second address: C3DDEF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jg 00007FC83CBF9996h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C3DDEF second address: C3DE00 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr [esp+04h] 0x0000000c push ebx 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C3DE00 second address: C3DE1E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ebx 0x00000007 mov eax, dword ptr [eax] 0x00000009 pushad 0x0000000a jne 00007FC83CBF999Ch 0x00000010 push eax 0x00000011 push edx 0x00000012 jns 00007FC83CBF9996h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C3DE1E second address: C3DE43 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov dword ptr [esp+04h], eax 0x0000000b jng 00007FC83CC615B0h 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007FC83CC615A2h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C42414 second address: C4241A instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C4241A second address: C4242E instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pushad 0x00000004 popad 0x00000005 jnl 00007FC83CC61596h 0x0000000b pop esi 0x0000000c ja 00007FC83CC615A2h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C4242E second address: C42434 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C42434 second address: C42449 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jno 00007FC83CC61598h 0x0000000e push eax 0x0000000f push esi 0x00000010 pop esi 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C42449 second address: C4244E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C4244E second address: C42465 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jnc 00007FC83CC61596h 0x00000009 jo 00007FC83CC61596h 0x0000000f jne 00007FC83CC61596h 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C44BB2 second address: C44BB8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C44BB8 second address: C44BBD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C44BBD second address: C44BE0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FC83CBF99A7h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C44BE0 second address: C44BE6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C44CC5 second address: C44CC9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C450A8 second address: C450B7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007FC83CC61596h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d push ecx 0x0000000e pop ecx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C450B7 second address: C450E0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC83CBF99A6h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b pushad 0x0000000c push eax 0x0000000d pushad 0x0000000e popad 0x0000000f pop eax 0x00000010 push eax 0x00000011 push edx 0x00000012 jno 00007FC83CBF9996h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C450E0 second address: C45107 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 xchg eax, ebx 0x00000008 or dword ptr [ebp+122D1B95h], esi 0x0000000e nop 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007FC83CC615A5h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C45107 second address: C4512E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FC83CBF99A1h 0x0000000b popad 0x0000000c push eax 0x0000000d jnl 00007FC83CBF99A8h 0x00000013 push eax 0x00000014 push edx 0x00000015 jo 00007FC83CBF9996h 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C45329 second address: C45350 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC83CC615A7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop esi 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f jp 00007FC83CC61596h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C45350 second address: C45356 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C45356 second address: C4536B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FC83CC615A1h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C476EF second address: C476F5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C476F5 second address: C47768 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FC83CC615A8h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dword ptr [esp], eax 0x0000000d sub dword ptr [ebp+122DB4CBh], eax 0x00000013 push 00000000h 0x00000015 mov esi, dword ptr [ebp+122D27B6h] 0x0000001b push 00000000h 0x0000001d push 00000000h 0x0000001f push esi 0x00000020 call 00007FC83CC61598h 0x00000025 pop esi 0x00000026 mov dword ptr [esp+04h], esi 0x0000002a add dword ptr [esp+04h], 00000019h 0x00000032 inc esi 0x00000033 push esi 0x00000034 ret 0x00000035 pop esi 0x00000036 ret 0x00000037 jmp 00007FC83CC615A3h 0x0000003c mov esi, 0DD089CAh 0x00000041 xchg eax, ebx 0x00000042 push eax 0x00000043 push edx 0x00000044 jnp 00007FC83CC6159Ch 0x0000004a push eax 0x0000004b push edx 0x0000004c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C47768 second address: C4776C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C4776C second address: C47781 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 ja 00007FC83CC61596h 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 popad 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C47781 second address: C4778B instructions: 0x00000000 rdtsc 0x00000002 jnl 00007FC83CBF9996h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C4778B second address: C47790 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C47FFC second address: C4800A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC83CBF999Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C48A90 second address: C48A96 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C4800A second address: C48027 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FC83CBF99A9h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C4A289 second address: C4A293 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 js 00007FC83CC61596h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C4A293 second address: C4A297 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C4A297 second address: C4A2DB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jnl 00007FC83CC615AEh 0x0000000f nop 0x00000010 xor esi, 73801F4Fh 0x00000016 push 00000000h 0x00000018 mov esi, dword ptr [ebp+122D2662h] 0x0000001e push 00000000h 0x00000020 mov edi, dword ptr [ebp+124588B2h] 0x00000026 xchg eax, ebx 0x00000027 pushad 0x00000028 push eax 0x00000029 push edx 0x0000002a push eax 0x0000002b push edx 0x0000002c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C4A2DB second address: C4A2DF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C4A2DF second address: C4A307 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FC83CC615A1h 0x0000000b popad 0x0000000c push eax 0x0000000d pushad 0x0000000e pushad 0x0000000f pushad 0x00000010 popad 0x00000011 jp 00007FC83CC61596h 0x00000017 popad 0x00000018 push eax 0x00000019 push edx 0x0000001a push edx 0x0000001b pop edx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C4AD71 second address: C4AD75 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C4DD56 second address: C4DD6F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 ja 00007FC83CC61596h 0x00000009 pushad 0x0000000a popad 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f je 00007FC83CC615A0h 0x00000015 push eax 0x00000016 push edx 0x00000017 push ecx 0x00000018 pop ecx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C4B58A second address: C4B58F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C4B58F second address: C4B595 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C4FFE0 second address: C4FFE5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C50FDF second address: C5102C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC83CC615A2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a mov dword ptr [esp], eax 0x0000000d mov edi, dword ptr [ebp+122D291Eh] 0x00000013 push 00000000h 0x00000015 mov bh, dh 0x00000017 push 00000000h 0x00000019 call 00007FC83CC615A8h 0x0000001e push ebx 0x0000001f mov edi, dword ptr [ebp+122D35BDh] 0x00000025 pop edi 0x00000026 pop edi 0x00000027 xchg eax, esi 0x00000028 pushad 0x00000029 push eax 0x0000002a push edx 0x0000002b push edx 0x0000002c pop edx 0x0000002d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C5102C second address: C51036 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C524B9 second address: C524BF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C53397 second address: C5339C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C542C2 second address: C542C6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C553ED second address: C553F3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C553F3 second address: C553F8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C553F8 second address: C553FE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C553FE second address: C55402 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C55402 second address: C5542A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jmp 00007FC83CBF999Bh 0x0000000e nop 0x0000000f cmc 0x00000010 push 00000000h 0x00000012 mov ebx, dword ptr [ebp+122D2214h] 0x00000018 push 00000000h 0x0000001a stc 0x0000001b push eax 0x0000001c push eax 0x0000001d push edx 0x0000001e push eax 0x0000001f push edx 0x00000020 pushad 0x00000021 popad 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C5542A second address: C55430 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: BF9831 second address: BF9835 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: BF9835 second address: BF9849 instructions: 0x00000000 rdtsc 0x00000002 je 00007FC83CC61596h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jno 00007FC83CC6159Ah 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C58AC0 second address: C58ACA instructions: 0x00000000 rdtsc 0x00000002 jp 00007FC83CBF9996h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C58ACA second address: C58AD5 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 jc 00007FC83CC61596h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C58AD5 second address: C58ADD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C59122 second address: C59129 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C5A0D7 second address: C5A0DB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C5A0DB second address: C5A0E1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C5A0E1 second address: C5A0FC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FC83CBF99A6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C5D3E9 second address: C5D413 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pop ebx 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a jmp 00007FC83CC615A2h 0x0000000f jmp 00007FC83CC6159Dh 0x00000014 popad 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C5D413 second address: C5D418 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C5C575 second address: C5C57A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C5F415 second address: C5F419 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C5F419 second address: C5F41F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C5E6F1 second address: C5E6F5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C6492B second address: C6492F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C6B88B second address: C6B896 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007FC83CBF9996h 0x0000000a pop edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C6B896 second address: C6B8B4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007FC83CC615A8h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C6BB48 second address: C6BB52 instructions: 0x00000000 rdtsc 0x00000002 jg 00007FC83CBF999Eh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C71C3E second address: C71C43 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C71C43 second address: C71C49 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C77590 second address: C775BB instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pushad 0x00000004 popad 0x00000005 pop edi 0x00000006 jmp 00007FC83CC615A2h 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007FC83CC6159Fh 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C002D0 second address: C002D4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C002D4 second address: C00306 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FC83CC6159Eh 0x0000000b ja 00007FC83CC6159Ch 0x00000011 popad 0x00000012 jo 00007FC83CC615A6h 0x00000018 push ecx 0x00000019 jp 00007FC83CC61596h 0x0000001f pop ecx 0x00000020 push edx 0x00000021 push eax 0x00000022 push edx 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C76822 second address: C76836 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC83CBF999Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push ecx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C76836 second address: C7683B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C7683B second address: C76868 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pushad 0x00000004 popad 0x00000005 pushad 0x00000006 popad 0x00000007 pop edx 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b ja 00007FC83CBF999Ah 0x00000011 pushad 0x00000012 popad 0x00000013 pushad 0x00000014 popad 0x00000015 pushad 0x00000016 jns 00007FC83CBF9996h 0x0000001c jmp 00007FC83CBF999Dh 0x00000021 pushad 0x00000022 popad 0x00000023 push eax 0x00000024 push edx 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C76868 second address: C76875 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 ja 00007FC83CC615A8h 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C769B5 second address: C769DB instructions: 0x00000000 rdtsc 0x00000002 jns 00007FC83CBF9996h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push edx 0x0000000c pop edx 0x0000000d push ecx 0x0000000e pop ecx 0x0000000f jmp 00007FC83CBF99A6h 0x00000014 popad 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C76CDD second address: C76CE9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007FC83CC61596h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C77149 second address: C7714D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C77407 second address: C77422 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007FC83CC6159Ah 0x0000000c pushad 0x0000000d popad 0x0000000e jg 00007FC83CC61596h 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C7A878 second address: C7A89A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FC83CBF999Bh 0x0000000b jmp 00007FC83CBF999Ah 0x00000010 pushad 0x00000011 push ebx 0x00000012 pop ebx 0x00000013 pushad 0x00000014 popad 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C7A89A second address: C7A8BF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c jmp 00007FC83CC615A9h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C7A8BF second address: C7A8CB instructions: 0x00000000 rdtsc 0x00000002 jnl 00007FC83CBF9996h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: BF488F second address: BF4893 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: BF4893 second address: BF4899 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: BF4899 second address: BF48CB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FC83CC615A3h 0x00000008 pushad 0x00000009 popad 0x0000000a pushad 0x0000000b popad 0x0000000c popad 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pushad 0x00000010 jnl 00007FC83CC615A1h 0x00000016 pushad 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: BF48CB second address: BF4910 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007FC83CBF9996h 0x0000000a jmp 00007FC83CBF99A1h 0x0000000f popad 0x00000010 pushad 0x00000011 pushad 0x00000012 popad 0x00000013 pushad 0x00000014 popad 0x00000015 push ebx 0x00000016 pop ebx 0x00000017 push ebx 0x00000018 pop ebx 0x00000019 popad 0x0000001a push eax 0x0000001b push edx 0x0000001c jmp 00007FC83CBF99A7h 0x00000021 js 00007FC83CBF9996h 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C822E8 second address: C822F6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007FC83CC61596h 0x0000000a pushad 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C42FD7 second address: C42FE2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jnl 00007FC83CBF9996h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C42FE2 second address: C4300E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 nop 0x00000008 mov ecx, dword ptr [ebp+122D27A2h] 0x0000000e lea eax, dword ptr [ebp+12489D3Ch] 0x00000014 mov cx, bx 0x00000017 nop 0x00000018 push eax 0x00000019 push edx 0x0000001a jp 00007FC83CC615A2h 0x00000020 jmp 00007FC83CC6159Ch 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C4300E second address: C2B7E9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jp 00007FC83CBF9996h 0x00000009 pushad 0x0000000a popad 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f jmp 00007FC83CBF999Ch 0x00000014 nop 0x00000015 mov di, D5C7h 0x00000019 call dword ptr [ebp+122D2302h] 0x0000001f push eax 0x00000020 push edx 0x00000021 jmp 00007FC83CBF99A6h 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C43450 second address: C43455 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C43551 second address: C43556 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C43624 second address: C4362E instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FC83CC61596h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C4376A second address: C4376E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C4376E second address: C43799 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov dword ptr [esp], esi 0x0000000a add di, E892h 0x0000000f nop 0x00000010 jmp 00007FC83CC615A6h 0x00000015 push eax 0x00000016 pushad 0x00000017 push ecx 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C43D94 second address: C43DAC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC83CBF99A3h 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C43DAC second address: C43E25 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 jmp 00007FC83CC6159Eh 0x00000008 pop esi 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov dword ptr [esp], eax 0x0000000e push 0000001Eh 0x00000010 push 00000000h 0x00000012 push esi 0x00000013 call 00007FC83CC61598h 0x00000018 pop esi 0x00000019 mov dword ptr [esp+04h], esi 0x0000001d add dword ptr [esp+04h], 0000001Ah 0x00000025 inc esi 0x00000026 push esi 0x00000027 ret 0x00000028 pop esi 0x00000029 ret 0x0000002a call 00007FC83CC615A9h 0x0000002f pushad 0x00000030 jng 00007FC83CC61596h 0x00000036 mov ebx, dword ptr [ebp+122D2479h] 0x0000003c popad 0x0000003d pop edx 0x0000003e nop 0x0000003f jo 00007FC83CC615ABh 0x00000045 push eax 0x00000046 push edx 0x00000047 jmp 00007FC83CC6159Dh 0x0000004c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C440F8 second address: C44142 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FC83CBF99A4h 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e push esi 0x0000000f jp 00007FC83CBF9996h 0x00000015 pop esi 0x00000016 pop edx 0x00000017 mov eax, dword ptr [esp+04h] 0x0000001b jg 00007FC83CBF99A4h 0x00000021 mov eax, dword ptr [eax] 0x00000023 push eax 0x00000024 push edx 0x00000025 jng 00007FC83CBF999Ch 0x0000002b push eax 0x0000002c push edx 0x0000002d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C44142 second address: C44146 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C4424E second address: C44254 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C44254 second address: C4426F instructions: 0x00000000 rdtsc 0x00000002 jl 00007FC83CC61596h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f jbe 00007FC83CC6159Ch 0x00000015 js 00007FC83CC61596h 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C893F0 second address: C893F6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C893F6 second address: C893FA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C893FA second address: C89403 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C89403 second address: C89409 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C89409 second address: C89411 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C8966B second address: C89684 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 jmp 00007FC83CC615A3h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C89684 second address: C89688 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C897A8 second address: C897AF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C06CA8 second address: C06CBE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FC83CBF99A0h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C8E124 second address: C8E128 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C8E128 second address: C8E130 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C8E130 second address: C8E135 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C8F0CF second address: C8F0FF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 jmp 00007FC83CBF99A7h 0x0000000a popad 0x0000000b jnc 00007FC83CBF9998h 0x00000011 pop edx 0x00000012 pop eax 0x00000013 jo 00007FC83CBF99A6h 0x00000019 pushad 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C8F547 second address: C8F54D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C8F54D second address: C8F559 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push edi 0x00000009 pop edi 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C8F559 second address: C8F58D instructions: 0x00000000 rdtsc 0x00000002 jno 00007FC83CC61596h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jnp 00007FC83CC6159Ch 0x00000010 jnc 00007FC83CC61596h 0x00000016 popad 0x00000017 push eax 0x00000018 push edx 0x00000019 jmp 00007FC83CC6159Eh 0x0000001e jmp 00007FC83CC6159Dh 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C8F58D second address: C8F5B8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FC83CBF999Eh 0x00000008 jmp 00007FC83CBF999Bh 0x0000000d jno 00007FC83CBF9996h 0x00000013 popad 0x00000014 jo 00007FC83CBF99A7h 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C8DE7D second address: C8DE82 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C93B9E second address: C93BA5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C93BA5 second address: C93BAA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C9643D second address: C96443 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C96443 second address: C96450 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jo 00007FC83CC61596h 0x00000009 push edi 0x0000000a pop edi 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C95FCA second address: C95FDA instructions: 0x00000000 rdtsc 0x00000002 jc 00007FC83CBF99A2h 0x00000008 jbe 00007FC83CBF9996h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C96152 second address: C96156 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C9C89A second address: C9C8BE instructions: 0x00000000 rdtsc 0x00000002 jno 00007FC83CBF9996h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b js 00007FC83CBF9996h 0x00000011 pushad 0x00000012 popad 0x00000013 jmp 00007FC83CBF99A0h 0x00000018 popad 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C9C8BE second address: C9C8DF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 jmp 00007FC83CC615A8h 0x00000008 push edx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push ebx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C9C8DF second address: C9C8E5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C9C8E5 second address: C9C8F7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c jns 00007FC83CC61596h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C9B590 second address: C9B594 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C9B594 second address: C9B5B3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC83CC615A1h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jg 00007FC83CC6159Ch 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C9B860 second address: C9B87A instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 jne 00007FC83CBF9996h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c ja 00007FC83CBF99A2h 0x00000012 jo 00007FC83CBF9996h 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C9B9A7 second address: C9B9AD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C9B9AD second address: C9B9CE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jno 00007FC83CBF9996h 0x0000000d jmp 00007FC83CBF99A2h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C9B9CE second address: C9B9D5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C43CF1 second address: C43CFB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 ja 00007FC83CBF9996h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C9C608 second address: C9C615 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 push ecx 0x00000007 pop ecx 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c pop eax 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C9C615 second address: C9C635 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC83CBF99A4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jne 00007FC83CBF999Ch 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C9F84E second address: C9F86E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 pushad 0x00000007 popad 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a jmp 00007FC83CC615A1h 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 push edi 0x00000013 pop edi 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C9F86E second address: C9F874 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C9EF96 second address: C9EF9A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C9F109 second address: C9F115 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop eax 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C9F115 second address: C9F119 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C9F571 second address: C9F577 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C9F577 second address: C9F57C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CA36F3 second address: CA3701 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pushad 0x00000006 jno 00007FC83CBF9996h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CA3701 second address: CA370F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007FC83CC61596h 0x0000000a popad 0x0000000b push esi 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CA2978 second address: CA297C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CA297C second address: CA298B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007FC83CC61596h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CA298B second address: CA2991 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CA2991 second address: CA29A2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007FC83CC61596h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d push edi 0x0000000e pop edi 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CA29A2 second address: CA29A6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CA2DCF second address: CA2DD9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 pushad 0x00000007 popad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CA2DD9 second address: CA2E00 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007FC83CBF99A9h 0x0000000a push edi 0x0000000b push ebx 0x0000000c pop ebx 0x0000000d pop edi 0x0000000e popad 0x0000000f push edi 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CA2E00 second address: CA2E25 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pushad 0x00000008 jmp 00007FC83CC6159Fh 0x0000000d jne 00007FC83CC61596h 0x00000013 jl 00007FC83CC61596h 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CA30C4 second address: CA30C8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CA30C8 second address: CA30D1 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CA30D1 second address: CA30E1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC83CBF999Bh 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CA32A6 second address: CA32AA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CA32AA second address: CA32B0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CA32B0 second address: CA32B6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CAB547 second address: CAB54F instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CA97B3 second address: CA97B9 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CA97B9 second address: CA97EB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edi 0x00000007 jmp 00007FC83CBF99A1h 0x0000000c jmp 00007FC83CBF99A9h 0x00000011 pop edi 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CA999B second address: CA99A1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CA9C28 second address: CA9C32 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 pushad 0x00000007 popad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CA9C32 second address: CA9C3B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 push ebx 0x00000007 pop ebx 0x00000008 popad 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CA9C3B second address: CA9C40 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CAAAB6 second address: CAAAEA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FC83CC6159Fh 0x00000008 jc 00007FC83CC61596h 0x0000000e push eax 0x0000000f pop eax 0x00000010 pushad 0x00000011 popad 0x00000012 popad 0x00000013 push eax 0x00000014 push edx 0x00000015 jmp 00007FC83CC615A5h 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CAAD6C second address: CAAD7D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007FC83CBF9996h 0x0000000a pop esi 0x0000000b pop ecx 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f push ebx 0x00000010 pop ebx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CAAD7D second address: CAAD9C instructions: 0x00000000 rdtsc 0x00000002 jl 00007FC83CC61596h 0x00000008 jmp 00007FC83CC6159Ch 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pushad 0x00000010 js 00007FC83CC61596h 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CB61CD second address: CB61D2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CB557F second address: CB5597 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007FC83CC615A1h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CB5597 second address: CB559B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CB559B second address: CB55A1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CB55A1 second address: CB55A7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CB55A7 second address: CB55BA instructions: 0x00000000 rdtsc 0x00000002 jns 00007FC83CC6159Eh 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CB589F second address: CB58AF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FC83CBF999Ah 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CB58AF second address: CB58B3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CB58B3 second address: CB58D4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC83CBF99A3h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 pop eax 0x00000011 pushad 0x00000012 popad 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CB58D4 second address: CB58E4 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FC83CC61596h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push edx 0x0000000d pop edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CB58E4 second address: CB58E8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CB58E8 second address: CB58FD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC83CC6159Fh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CB5BC4 second address: CB5BC9 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CB5BC9 second address: CB5BF0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edi 0x00000007 pop edx 0x00000008 pop eax 0x00000009 je 00007FC83CC615B6h 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 popad 0x00000013 jmp 00007FC83CC615A4h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CB5D75 second address: CB5D88 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 jl 00007FC83CBF99A2h 0x0000000b jno 00007FC83CBF9996h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CB5D88 second address: CB5D8F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CB5D8F second address: CB5DA2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC83CBF999Dh 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CBDE22 second address: CBDE55 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC83CC615A1h 0x00000009 pushad 0x0000000a pushad 0x0000000b popad 0x0000000c pushad 0x0000000d popad 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007FC83CC615A6h 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CBDE55 second address: CBDE59 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CBBF41 second address: CBBF48 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CBC3CE second address: CBC3EF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC83CBF999Eh 0x00000009 pushad 0x0000000a je 00007FC83CBF999Ah 0x00000010 pushad 0x00000011 popad 0x00000012 push ecx 0x00000013 pop ecx 0x00000014 push eax 0x00000015 push edx 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CBC3EF second address: CBC3F3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CBC52E second address: CBC539 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CBC539 second address: CBC55D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC83CC615A9h 0x00000007 push ecx 0x00000008 pop ecx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c push esi 0x0000000d pop esi 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CBC6C3 second address: CBC6CD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pop esi 0x00000006 pushad 0x00000007 push esi 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CBC6CD second address: CBC6FE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pushad 0x00000006 push ecx 0x00000007 pop ecx 0x00000008 jmp 00007FC83CC6159Dh 0x0000000d jmp 00007FC83CC615A6h 0x00000012 push edx 0x00000013 pop edx 0x00000014 popad 0x00000015 pushad 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CBC82F second address: CBC833 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CBCC9F second address: CBCCAB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 ja 00007FC83CC61596h 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CBCE2D second address: CBCE32 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CBCE32 second address: CBCE39 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edx 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CBCE39 second address: CBCE3F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CBDC69 second address: CBDC7D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FC83CC6159Eh 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CBDC7D second address: CBDC83 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CBDC83 second address: CBDC87 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CBBAA7 second address: CBBAF0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FC83CBF99A7h 0x00000008 pushad 0x00000009 popad 0x0000000a push ebx 0x0000000b pop ebx 0x0000000c popad 0x0000000d jmp 00007FC83CBF99A8h 0x00000012 pop edx 0x00000013 pop eax 0x00000014 push eax 0x00000015 push edx 0x00000016 pushad 0x00000017 jbe 00007FC83CBF9996h 0x0000001d pushad 0x0000001e popad 0x0000001f popad 0x00000020 push eax 0x00000021 push edx 0x00000022 push eax 0x00000023 push edx 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CBBAF0 second address: CBBAF6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CBBAF6 second address: CBBAFA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CBBAFA second address: CBBB00 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CBBB00 second address: CBBB05 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CC5305 second address: CC530F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007FC83CC61596h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CC4E62 second address: CC4E73 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 popad 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 jo 00007FC83CBF9996h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CC4E73 second address: CC4E77 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CC4E77 second address: CC4E95 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC83CBF999Bh 0x00000007 jnc 00007FC83CBF9996h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pushad 0x00000010 push esi 0x00000011 pop esi 0x00000012 pushad 0x00000013 popad 0x00000014 pushad 0x00000015 popad 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CC777F second address: CC77B5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007FC83CC615A5h 0x0000000b popad 0x0000000c jne 00007FC83CC6159Ch 0x00000012 push eax 0x00000013 pushad 0x00000014 popad 0x00000015 jng 00007FC83CC61596h 0x0000001b pop eax 0x0000001c push eax 0x0000001d push edx 0x0000001e push ecx 0x0000001f pop ecx 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CDCFA7 second address: CDCFAD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CDCFAD second address: CDCFB1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CDCFB1 second address: CDCFCA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC83CBF999Ah 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c jo 00007FC83CBF9996h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CDCFCA second address: CDCFD2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CDCFD2 second address: CDCFD7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CDCFD7 second address: CDCFEA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FC83CC6159Fh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CDCFEA second address: CDD008 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 jmp 00007FC83CBF99A5h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CED9F0 second address: CED9F5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CEDB6C second address: CEDB8F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnp 00007FC83CBF9996h 0x0000000a jmp 00007FC83CBF99A7h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CEDE6F second address: CEDE73 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CEE124 second address: CEE13F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC83CBF99A7h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CF1AE4 second address: CF1B19 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FC83CC61596h 0x00000008 push esi 0x00000009 pop esi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pop edi 0x0000000d push eax 0x0000000e push edx 0x0000000f push edi 0x00000010 jmp 00007FC83CC6159Eh 0x00000015 pop edi 0x00000016 jmp 00007FC83CC615A6h 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CF1B19 second address: CF1B1E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CF17BE second address: CF17C4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CFCE6C second address: CFCE85 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 jmp 00007FC83CBF99A3h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CFBA23 second address: CFBA27 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D0C6E3 second address: D0C6EF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edi 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 push eax 0x0000000a pop eax 0x0000000b pop edi 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D0C6EF second address: D0C708 instructions: 0x00000000 rdtsc 0x00000002 jns 00007FC83CC615A3h 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D0DC50 second address: D0DC54 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D0DC54 second address: D0DC5A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D0DC5A second address: D0DC6E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FC83CBF999Fh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D0DC6E second address: D0DC82 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007FC83CC6159Dh 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D0DC82 second address: D0DC86 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D1203A second address: D1203E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D1203E second address: D12050 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jnc 00007FC83CBF9996h 0x00000010 push ecx 0x00000011 pop ecx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D12050 second address: D12054 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D121C5 second address: D121CF instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FC83CBF9996h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D121CF second address: D12212 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 jmp 00007FC83CC615A0h 0x00000008 jmp 00007FC83CC615A0h 0x0000000d pop eax 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 push edx 0x00000012 push esi 0x00000013 jmp 00007FC83CC615A8h 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D12212 second address: D12217 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D28992 second address: D289B2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC83CC615A6h 0x00000007 jp 00007FC83CC6159Eh 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D28CCA second address: D28CD7 instructions: 0x00000000 rdtsc 0x00000002 jg 00007FC83CBF9996h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D28CD7 second address: D28CE0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D28E4D second address: D28E60 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 jmp 00007FC83CBF999Eh 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D28E60 second address: D28E66 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D28E66 second address: D28E6C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D294D9 second address: D294DF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D294DF second address: D294E9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnp 00007FC83CBF9996h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D294E9 second address: D294ED instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D2AF6E second address: D2AF7B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D2AF7B second address: D2AF81 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D2AF81 second address: D2AF85 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D2AF85 second address: D2AF93 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 popad 0x00000009 push ebx 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D2C68E second address: D2C696 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push esi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D2C696 second address: D2C6B8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop esi 0x00000007 push edi 0x00000008 pushad 0x00000009 popad 0x0000000a pop edi 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FC83CC615A4h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D2C6B8 second address: D2C6DB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jo 00007FC83CBF9996h 0x0000000a jmp 00007FC83CBF99A9h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D2F2A1 second address: D2F2AB instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D2F307 second address: D2F31C instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FC83CBF9996h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b push eax 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f jne 00007FC83CBF9996h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D2F31C second address: D2F3AB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC83CC615A0h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jmp 00007FC83CC615A3h 0x0000000f pop eax 0x00000010 popad 0x00000011 nop 0x00000012 mov edx, dword ptr [ebp+122D2752h] 0x00000018 mov edx, dword ptr [ebp+122D2612h] 0x0000001e push 00000004h 0x00000020 push 00000000h 0x00000022 push eax 0x00000023 call 00007FC83CC61598h 0x00000028 pop eax 0x00000029 mov dword ptr [esp+04h], eax 0x0000002d add dword ptr [esp+04h], 00000016h 0x00000035 inc eax 0x00000036 push eax 0x00000037 ret 0x00000038 pop eax 0x00000039 ret 0x0000003a call 00007FC83CC61599h 0x0000003f pushad 0x00000040 push edx 0x00000041 pushad 0x00000042 popad 0x00000043 pop edx 0x00000044 jmp 00007FC83CC615A1h 0x00000049 popad 0x0000004a push eax 0x0000004b push eax 0x0000004c push edx 0x0000004d jnl 00007FC83CC615A5h 0x00000053 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D2F3AB second address: D2F3B2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D2F3B2 second address: D2F3ED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 mov eax, dword ptr [esp+04h] 0x0000000b jp 00007FC83CC6159Ch 0x00000011 pushad 0x00000012 pushad 0x00000013 popad 0x00000014 pushad 0x00000015 popad 0x00000016 popad 0x00000017 mov eax, dword ptr [eax] 0x00000019 push edi 0x0000001a jmp 00007FC83CC6159Eh 0x0000001f pop edi 0x00000020 mov dword ptr [esp+04h], eax 0x00000024 push eax 0x00000025 push edx 0x00000026 jmp 00007FC83CC6159Ch 0x0000002b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D2F3ED second address: D2F3F2 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D2F649 second address: D2F6A2 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FC83CC61596h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop ebx 0x0000000b mov dword ptr [esp], eax 0x0000000e mov edx, dword ptr [ebp+122D1A64h] 0x00000014 push dword ptr [ebp+122D2236h] 0x0000001a push 00000000h 0x0000001c push ebp 0x0000001d call 00007FC83CC61598h 0x00000022 pop ebp 0x00000023 mov dword ptr [esp+04h], ebp 0x00000027 add dword ptr [esp+04h], 00000019h 0x0000002f inc ebp 0x00000030 push ebp 0x00000031 ret 0x00000032 pop ebp 0x00000033 ret 0x00000034 mov edx, dword ptr [ebp+122D230Eh] 0x0000003a call 00007FC83CC61599h 0x0000003f push eax 0x00000040 push edx 0x00000041 jmp 00007FC83CC6159Dh 0x00000046 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D2F6A2 second address: D2F6CE instructions: 0x00000000 rdtsc 0x00000002 ja 00007FC83CBF9998h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b js 00007FC83CBF99A1h 0x00000011 jmp 00007FC83CBF999Bh 0x00000016 mov eax, dword ptr [esp+04h] 0x0000001a jng 00007FC83CBF99AEh 0x00000020 push eax 0x00000021 push edx 0x00000022 push eax 0x00000023 push edx 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D2F6CE second address: D2F6D2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D2F6D2 second address: D2F705 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC83CBF999Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [eax] 0x0000000b jg 00007FC83CBF99A8h 0x00000011 mov dword ptr [esp+04h], eax 0x00000015 push ebx 0x00000016 push eax 0x00000017 push edx 0x00000018 pushad 0x00000019 popad 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D30C5B second address: D30C7E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC83CC615A9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push ecx 0x0000000a push ebx 0x0000000b pushad 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C472FD second address: C47301 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C47301 second address: C47327 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FC83CC61596h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edi 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FC83CC615A8h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: C474F2 second address: C474F8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |