Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C76170 |
0_2_00C76170 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C5E2A9 |
0_2_00C5E2A9 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C7C6D7 |
0_2_00C7C6D7 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C8E690 |
0_2_00C8E690 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C587F0 |
0_2_00C587F0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C5A960 |
0_2_00C5A960 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C66B7E |
0_2_00C66B7E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C86C40 |
0_2_00C86C40 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C60FD6 |
0_2_00C60FD6 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C86F90 |
0_2_00C86F90 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C733A0 |
0_2_00C733A0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C715F0 |
0_2_00C715F0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C597B0 |
0_2_00C597B0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C89B90 |
0_2_00C89B90 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C8DCF0 |
0_2_00C8DCF0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C7BFD3 |
0_2_00C7BFD3 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C7BFDA |
0_2_00C7BFDA |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D240DE |
0_2_00D240DE |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DB40D4 |
0_2_00DB40D4 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C880D9 |
0_2_00C880D9 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DC20CF |
0_2_00DC20CF |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D7C0C1 |
0_2_00D7C0C1 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CE40D6 |
0_2_00CE40D6 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D5A0F2 |
0_2_00D5A0F2 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D820F1 |
0_2_00D820F1 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DB20F7 |
0_2_00DB20F7 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D3A0FC |
0_2_00D3A0FC |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DA00EB |
0_2_00DA00EB |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D6E0E1 |
0_2_00D6E0E1 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DDE091 |
0_2_00DDE091 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D7409A |
0_2_00D7409A |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D5609A |
0_2_00D5609A |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CF209F |
0_2_00CF209F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D9608A |
0_2_00D9608A |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CC2092 |
0_2_00CC2092 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D7A089 |
0_2_00D7A089 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DCA0BD |
0_2_00DCA0BD |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D2A0B0 |
0_2_00D2A0B0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DAE0BE |
0_2_00DAE0BE |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DB60B3 |
0_2_00DB60B3 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C780B0 |
0_2_00C780B0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D500AC |
0_2_00D500AC |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D8C055 |
0_2_00D8C055 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D86041 |
0_2_00D86041 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CB6051 |
0_2_00CB6051 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CC8050 |
0_2_00CC8050 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CF406F |
0_2_00CF406F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C75F7D |
0_2_00C75F7D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C5E06A |
0_2_00C5E06A |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D2606D |
0_2_00D2606D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DCE01C |
0_2_00DCE01C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D7E011 |
0_2_00D7E011 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CE2003 |
0_2_00CE2003 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D3001E |
0_2_00D3001E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CB8018 |
0_2_00CB8018 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DBE00C |
0_2_00DBE00C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D3400E |
0_2_00D3400E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CCE03B |
0_2_00CCE03B |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C8A030 |
0_2_00C8A030 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D6002D |
0_2_00D6002D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E201E6 |
0_2_00E201E6 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CBA1C3 |
0_2_00CBA1C3 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D2E1C2 |
0_2_00D2E1C2 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D661C3 |
0_2_00D661C3 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C801D0 |
0_2_00C801D0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DD01C5 |
0_2_00DD01C5 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D121C8 |
0_2_00D121C8 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D461CB |
0_2_00D461CB |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C581F0 |
0_2_00C581F0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D401E8 |
0_2_00D401E8 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CCE19D |
0_2_00CCE19D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CB2192 |
0_2_00CB2192 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CC0195 |
0_2_00CC0195 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D021B4 |
0_2_00D021B4 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DC81B0 |
0_2_00DC81B0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D621A6 |
0_2_00D621A6 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DAC1A9 |
0_2_00DAC1A9 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CD21B3 |
0_2_00CD21B3 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D8015C |
0_2_00D8015C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CD015B |
0_2_00CD015B |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D90141 |
0_2_00D90141 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D60173 |
0_2_00D60173 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D0A169 |
0_2_00D0A169 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DE8165 |
0_2_00DE8165 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D54115 |
0_2_00D54115 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C7A100 |
0_2_00C7A100 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D3211D |
0_2_00D3211D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D5810E |
0_2_00D5810E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DFE101 |
0_2_00DFE101 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D9C13B |
0_2_00D9C13B |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DE0137 |
0_2_00DE0137 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DE4123 |
0_2_00DE4123 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CB82CB |
0_2_00CB82CB |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C8E2C0 |
0_2_00C8E2C0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D4A2C2 |
0_2_00D4A2C2 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D662CE |
0_2_00D662CE |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CF62E2 |
0_2_00CF62E2 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D762E4 |
0_2_00D762E4 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DB02BB |
0_2_00DB02BB |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D942B0 |
0_2_00D942B0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CCC2A7 |
0_2_00CCC2A7 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D362B8 |
0_2_00D362B8 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DE22A2 |
0_2_00DE22A2 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D68254 |
0_2_00D68254 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DEE246 |
0_2_00DEE246 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D0424B |
0_2_00D0424B |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DAA241 |
0_2_00DAA241 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DDA269 |
0_2_00DDA269 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C54270 |
0_2_00C54270 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C72270 |
0_2_00C72270 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CB4271 |
0_2_00CB4271 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DA2218 |
0_2_00DA2218 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C56200 |
0_2_00C56200 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D00203 |
0_2_00D00203 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DDE209 |
0_2_00DDE209 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D5E203 |
0_2_00D5E203 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D84229 |
0_2_00D84229 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D063D7 |
0_2_00D063D7 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DBA3CB |
0_2_00DBA3CB |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D9C3F2 |
0_2_00D9C3F2 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D383E1 |
0_2_00D383E1 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C8A3F0 |
0_2_00C8A3F0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CDE38D |
0_2_00CDE38D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D02390 |
0_2_00D02390 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CBA38E |
0_2_00CBA38E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D9E397 |
0_2_00D9E397 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DC238C |
0_2_00DC238C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DE6388 |
0_2_00DE6388 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CD8392 |
0_2_00CD8392 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D783BD |
0_2_00D783BD |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D223BF |
0_2_00D223BF |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D163A6 |
0_2_00D163A6 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DC03A1 |
0_2_00DC03A1 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DAC35E |
0_2_00DAC35E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CE0348 |
0_2_00CE0348 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D26341 |
0_2_00D26341 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CFE352 |
0_2_00CFE352 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E1437F |
0_2_00E1437F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C6C360 |
0_2_00C6C360 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CC430D |
0_2_00CC430D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D4433A |
0_2_00D4433A |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D304D7 |
0_2_00D304D7 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D6E4D2 |
0_2_00D6E4D2 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CC24D0 |
0_2_00CC24D0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D3E4CF |
0_2_00D3E4CF |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D184FB |
0_2_00D184FB |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D544E4 |
0_2_00D544E4 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CE24FC |
0_2_00CE24FC |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D104E5 |
0_2_00D104E5 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CB24F3 |
0_2_00CB24F3 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DD44E7 |
0_2_00DD44E7 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DB84E6 |
0_2_00DB84E6 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CD448C |
0_2_00CD448C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DC648A |
0_2_00DC648A |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D2A485 |
0_2_00D2A485 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CCA491 |
0_2_00CCA491 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D8C485 |
0_2_00D8C485 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D484BC |
0_2_00D484BC |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D0E4AC |
0_2_00D0E4AC |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D724A8 |
0_2_00D724A8 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D9045D |
0_2_00D9045D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DEA47F |
0_2_00DEA47F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D0A47A |
0_2_00D0A47A |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D8E475 |
0_2_00D8E475 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DCC471 |
0_2_00DCC471 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CC4473 |
0_2_00CC4473 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D56413 |
0_2_00D56413 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DBC416 |
0_2_00DBC416 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DB642C |
0_2_00DB642C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C86430 |
0_2_00C86430 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DDC5DD |
0_2_00DDC5DD |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CFA5CE |
0_2_00CFA5CE |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DE85CF |
0_2_00DE85CF |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DDE5C7 |
0_2_00DDE5C7 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D465F7 |
0_2_00D465F7 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D7C5E3 |
0_2_00D7C5E3 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D62584 |
0_2_00D62584 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DE458A |
0_2_00DE458A |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CB8590 |
0_2_00CB8590 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D4E5B8 |
0_2_00D4E5B8 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CF65BA |
0_2_00CF65BA |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CD6543 |
0_2_00CD6543 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D2E566 |
0_2_00D2E566 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DD2569 |
0_2_00DD2569 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DEC56B |
0_2_00DEC56B |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D8A56E |
0_2_00D8A56E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C66571 |
0_2_00C66571 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D9C566 |
0_2_00D9C566 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D60516 |
0_2_00D60516 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CB050E |
0_2_00CB050E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CD8502 |
0_2_00CD8502 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DA0505 |
0_2_00DA0505 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DA853C |
0_2_00DA853C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CFE526 |
0_2_00CFE526 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D3C6D8 |
0_2_00D3C6D8 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D5E6D9 |
0_2_00D5E6D9 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DD86CB |
0_2_00DD86CB |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C766E7 |
0_2_00C766E7 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CC06EF |
0_2_00CC06EF |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CD46EA |
0_2_00CD46EA |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CBA6E5 |
0_2_00CBA6E5 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D0C6E8 |
0_2_00D0C6E8 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DAE69D |
0_2_00DAE69D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D80688 |
0_2_00D80688 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C56690 |
0_2_00C56690 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C86690 |
0_2_00C86690 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E2868D |
0_2_00E2868D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CDE6BE |
0_2_00CDE6BE |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DE26A3 |
0_2_00DE26A3 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D44656 |
0_2_00D44656 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D04641 |
0_2_00D04641 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D42643 |
0_2_00D42643 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D1264C |
0_2_00D1264C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D2E675 |
0_2_00D2E675 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C62670 |
0_2_00C62670 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CF0678 |
0_2_00CF0678 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D1066D |
0_2_00D1066D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DBE617 |
0_2_00DBE617 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D88615 |
0_2_00D88615 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D5C60A |
0_2_00D5C60A |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CB4629 |
0_2_00CB4629 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D7E7D6 |
0_2_00D7E7D6 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D4A7DD |
0_2_00D4A7DD |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CCA7DE |
0_2_00CCA7DE |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D567C7 |
0_2_00D567C7 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D707C1 |
0_2_00D707C1 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CC87EB |
0_2_00CC87EB |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CEE7E7 |
0_2_00CEE7E7 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D7A7E3 |
0_2_00D7A7E3 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CB6799 |
0_2_00CB6799 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CE879D |
0_2_00CE879D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D62783 |
0_2_00D62783 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CDC7AF |
0_2_00CDC7AF |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C667A5 |
0_2_00C667A5 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D387B4 |
0_2_00D387B4 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DC67BB |
0_2_00DC67BB |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CC67A4 |
0_2_00CC67A4 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CEA7BF |
0_2_00CEA7BF |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CC27BF |
0_2_00CC27BF |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CD87B8 |
0_2_00CD87B8 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CFC767 |
0_2_00CFC767 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C70717 |
0_2_00C70717 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CEC716 |
0_2_00CEC716 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DDA703 |
0_2_00DDA703 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D26732 |
0_2_00D26732 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D34736 |
0_2_00D34736 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C68731 |
0_2_00C68731 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D64721 |
0_2_00D64721 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D2A8DC |
0_2_00D2A8DC |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D208C6 |
0_2_00D208C6 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D4E8C3 |
0_2_00D4E8C3 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D8E8C2 |
0_2_00D8E8C2 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D908F7 |
0_2_00D908F7 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D408E5 |
0_2_00D408E5 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CD68F1 |
0_2_00CD68F1 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D4C896 |
0_2_00D4C896 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DA2891 |
0_2_00DA2891 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DB488F |
0_2_00DB488F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D30886 |
0_2_00D30886 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D3A888 |
0_2_00D3A888 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D3288E |
0_2_00D3288E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DD6855 |
0_2_00DD6855 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D5A85E |
0_2_00D5A85E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DC2853 |
0_2_00DC2853 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DCE842 |
0_2_00DCE842 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D60877 |
0_2_00D60877 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DB6878 |
0_2_00DB6878 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D02810 |
0_2_00D02810 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D0080C |
0_2_00D0080C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D6E835 |
0_2_00D6E835 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D9683C |
0_2_00D9683C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CBE9C9 |
0_2_00CBE9C9 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E5A9EB |
0_2_00E5A9EB |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DD29CD |
0_2_00DD29CD |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D8A9CD |
0_2_00D8A9CD |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D9C9CE |
0_2_00D9C9CE |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DE49C9 |
0_2_00DE49C9 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D469CD |
0_2_00D469CD |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CF29EF |
0_2_00CF29EF |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D829F2 |
0_2_00D829F2 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D409FA |
0_2_00D409FA |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CB89FB |
0_2_00CB89FB |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CBC989 |
0_2_00CBC989 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D5C996 |
0_2_00D5C996 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CF4985 |
0_2_00CF4985 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D4299A |
0_2_00D4299A |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DE098F |
0_2_00DE098F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C58990 |
0_2_00C58990 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DA89BA |
0_2_00DA89BA |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D5A9BF |
0_2_00D5A9BF |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D669B9 |
0_2_00D669B9 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D0C944 |
0_2_00D0C944 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D86943 |
0_2_00D86943 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EC6973 |
0_2_00EC6973 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DB0976 |
0_2_00DB0976 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CB497B |
0_2_00CB497B |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D18964 |
0_2_00D18964 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C7297F |
0_2_00C7297F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CCE973 |
0_2_00CCE973 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CF690F |
0_2_00CF690F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CE290B |
0_2_00CE290B |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DC8910 |
0_2_00DC8910 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D78907 |
0_2_00D78907 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D7C907 |
0_2_00D7C907 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D98908 |
0_2_00D98908 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CB291D |
0_2_00CB291D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DDC90B |
0_2_00DDC90B |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D84930 |
0_2_00D84930 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D5692C |
0_2_00D5692C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DD8ADD |
0_2_00DD8ADD |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C8CAC0 |
0_2_00C8CAC0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D48AD9 |
0_2_00D48AD9 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D64ADB |
0_2_00D64ADB |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D5EAC1 |
0_2_00D5EAC1 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CBAADD |
0_2_00CBAADD |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D08AF4 |
0_2_00D08AF4 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D72AF2 |
0_2_00D72AF2 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DB0AFD |
0_2_00DB0AFD |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D22AF5 |
0_2_00D22AF5 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DBEA9F |
0_2_00DBEA9F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CB0A93 |
0_2_00CB0A93 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CF0A93 |
0_2_00CF0A93 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DECAB5 |
0_2_00DECAB5 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DE2AB2 |
0_2_00DE2AB2 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D54AA6 |
0_2_00D54AA6 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C64A40 |
0_2_00C64A40 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00F00A77 |
0_2_00F00A77 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D6CA5B |
0_2_00D6CA5B |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C5CA54 |
0_2_00C5CA54 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D68A43 |
0_2_00D68A43 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CF8A54 |
0_2_00CF8A54 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DA6A44 |
0_2_00DA6A44 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D8CA7D |
0_2_00D8CA7D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CC4A6A |
0_2_00CC4A6A |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DACA73 |
0_2_00DACA73 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D3CA07 |
0_2_00D3CA07 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D00A06 |
0_2_00D00A06 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D2CA38 |
0_2_00D2CA38 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D12A3E |
0_2_00D12A3E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D7EBD6 |
0_2_00D7EBD6 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D80BD4 |
0_2_00D80BD4 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D54BD8 |
0_2_00D54BD8 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DBCBC9 |
0_2_00DBCBC9 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DB4BFD |
0_2_00DB4BFD |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D44BFE |
0_2_00D44BFE |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CCCBFF |
0_2_00CCCBFF |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D60BE0 |
0_2_00D60BE0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D9EBEE |
0_2_00D9EBEE |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D96BE1 |
0_2_00D96BE1 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CEEB87 |
0_2_00CEEB87 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DA4B90 |
0_2_00DA4B90 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D36B9F |
0_2_00D36B9F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C54BA0 |
0_2_00C54BA0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CC0BA3 |
0_2_00CC0BA3 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D88BA5 |
0_2_00D88BA5 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D62B55 |
0_2_00D62B55 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CD4B40 |
0_2_00CD4B40 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C6CB5A |
0_2_00C6CB5A |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D94B7B |
0_2_00D94B7B |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CDCB64 |
0_2_00CDCB64 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D26B60 |
0_2_00D26B60 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DCAB1C |
0_2_00DCAB1C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DAEB18 |
0_2_00DAEB18 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DC2B0C |
0_2_00DC2B0C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D28B0C |
0_2_00D28B0C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DD0B30 |
0_2_00DD0B30 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CFCB3F |
0_2_00CFCB3F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DC4CDC |
0_2_00DC4CDC |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D4ACD3 |
0_2_00D4ACD3 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D4ECDF |
0_2_00D4ECDF |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CE2CD6 |
0_2_00CE2CD6 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CB2CE8 |
0_2_00CB2CE8 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C8CCE0 |
0_2_00C8CCE0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CBCCFE |
0_2_00CBCCFE |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CB8CF3 |
0_2_00CB8CF3 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CFCCF6 |
0_2_00CFCCF6 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D32CE8 |
0_2_00D32CE8 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C72CF8 |
0_2_00C72CF8 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DA0CE5 |
0_2_00DA0CE5 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DE6C9D |
0_2_00DE6C9D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D98C83 |
0_2_00D98C83 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CD0C90 |
0_2_00CD0C90 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D84CB8 |
0_2_00D84CB8 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CC4CAF |
0_2_00CC4CAF |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CE6CA9 |
0_2_00CE6CA9 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D3ACA1 |
0_2_00D3ACA1 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DAAC5E |
0_2_00DAAC5E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C84C4D |
0_2_00C84C4D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D90C4C |
0_2_00D90C4C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D1AC7C |
0_2_00D1AC7C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DD4C6C |
0_2_00DD4C6C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D7AC60 |
0_2_00D7AC60 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DCEC16 |
0_2_00DCEC16 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C68C1E |
0_2_00C68C1E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D1CC0A |
0_2_00D1CC0A |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D94C3B |
0_2_00D94C3B |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D86C3B |
0_2_00D86C3B |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CE0C23 |
0_2_00CE0C23 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D10C3E |
0_2_00D10C3E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D18C3E |
0_2_00D18C3E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DC6C2C |
0_2_00DC6C2C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DA2C2D |
0_2_00DA2C2D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D3CDF2 |
0_2_00D3CDF2 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D3EDFB |
0_2_00D3EDFB |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CE6DF9 |
0_2_00CE6DF9 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D92D8D |
0_2_00D92D8D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DC0D88 |
0_2_00DC0D88 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CBEDA8 |
0_2_00CBEDA8 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DBADAC |
0_2_00DBADAC |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CE2DB2 |
0_2_00CE2DB2 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DCCD5C |
0_2_00DCCD5C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CCAD48 |
0_2_00CCAD48 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D4CD45 |
0_2_00D4CD45 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C8CD60 |
0_2_00C8CD60 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C74D70 |
0_2_00C74D70 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DD2D66 |
0_2_00DD2D66 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DDCD1F |
0_2_00DDCD1F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D8ED3A |
0_2_00D8ED3A |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D2EEDE |
0_2_00D2EEDE |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E1AEEC |
0_2_00E1AEEC |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D50EC8 |
0_2_00D50EC8 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DC0EFC |
0_2_00DC0EFC |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D2CEE2 |
0_2_00D2CEE2 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CBEEFF |
0_2_00CBEEFF |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D5CEE0 |
0_2_00D5CEE0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CC2EFA |
0_2_00CC2EFA |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CB0EF7 |
0_2_00CB0EF7 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D88E88 |
0_2_00D88E88 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C66E97 |
0_2_00C66E97 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D62E85 |
0_2_00D62E85 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C52EA0 |
0_2_00C52EA0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D00EBA |
0_2_00D00EBA |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D40EBE |
0_2_00D40EBE |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C76EBE |
0_2_00C76EBE |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D30EAE |
0_2_00D30EAE |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DD0EA3 |
0_2_00DD0EA3 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CC0E4A |
0_2_00CC0E4A |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CF8E42 |
0_2_00CF8E42 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DDAE42 |
0_2_00DDAE42 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DE8E66 |
0_2_00DE8E66 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D06E69 |
0_2_00D06E69 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DECE61 |
0_2_00DECE61 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CC8E0F |
0_2_00CC8E0F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C6AE00 |
0_2_00C6AE00 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C8CE00 |
0_2_00C8CE00 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DB8E12 |
0_2_00DB8E12 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CECE1E |
0_2_00CECE1E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D20E01 |
0_2_00D20E01 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DDEE06 |
0_2_00DDEE06 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D52E2D |
0_2_00D52E2D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CE0FCD |
0_2_00CE0FCD |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CFAFC2 |
0_2_00CFAFC2 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CEAFC0 |
0_2_00CEAFC0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D22FC2 |
0_2_00D22FC2 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D80FC3 |
0_2_00D80FC3 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DE2FFE |
0_2_00DE2FFE |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CDCFEC |
0_2_00CDCFEC |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DCAFF8 |
0_2_00DCAFF8 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CF0FE4 |
0_2_00CF0FE4 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D28FE3 |
0_2_00D28FE3 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DAEFE8 |
0_2_00DAEFE8 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D66F9E |
0_2_00D66F9E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DD6F93 |
0_2_00DD6F93 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DA4F95 |
0_2_00DA4F95 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D7EF89 |
0_2_00D7EF89 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C68FAD |
0_2_00C68FAD |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D56FBA |
0_2_00D56FBA |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D7CFA6 |
0_2_00D7CFA6 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CF2FB8 |
0_2_00CF2FB8 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D42F55 |
0_2_00D42F55 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D82F4D |
0_2_00D82F4D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D9EF41 |
0_2_00D9EF41 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C78F5D |
0_2_00C78F5D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D98F42 |
0_2_00D98F42 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CD8F6C |
0_2_00CD8F6C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D2AF70 |
0_2_00D2AF70 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DEEF77 |
0_2_00DEEF77 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D32F79 |
0_2_00D32F79 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CD4F09 |
0_2_00CD4F09 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D3AF1B |
0_2_00D3AF1B |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C64F08 |
0_2_00C64F08 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D46F1B |
0_2_00D46F1B |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DB2F31 |
0_2_00DB2F31 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D5EF3A |
0_2_00D5EF3A |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D6EF23 |
0_2_00D6EF23 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C6EF30 |
0_2_00C6EF30 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D0EF26 |
0_2_00D0EF26 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CCEF36 |
0_2_00CCEF36 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DB6F27 |
0_2_00DB6F27 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D590DC |
0_2_00D590DC |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CC30C2 |
0_2_00CC30C2 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D5B0C2 |
0_2_00D5B0C2 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DC90FA |
0_2_00DC90FA |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E1F0D3 |
0_2_00E1F0D3 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CDF0FF |
0_2_00CDF0FF |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D6F0E0 |
0_2_00D6F0E0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D7B0EA |
0_2_00D7B0EA |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C7D085 |
0_2_00C7D085 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DC7081 |
0_2_00DC7081 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D690B5 |
0_2_00D690B5 |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: CA90B1 second address: CA90D2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F450CC4A619h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: CA90D2 second address: CA90D6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E281F3 second address: E281F9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E281F9 second address: E28201 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push ebx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E2D3C1 second address: E2D3DD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jns 00007F450CC4A606h 0x0000000c popad 0x0000000d jmp 00007F450CC4A60Fh 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E30954 second address: E30963 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F450CC4AB16h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b pushad 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E30A20 second address: E30A24 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E30A24 second address: E30A2A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E30A2A second address: E30A51 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F450CC4A618h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [eax] 0x0000000b pushad 0x0000000c jo 00007F450CC4A60Ch 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E30A51 second address: E30A5D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007F450CC4AB1Ch 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E30A5D second address: E30ACD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 mov dword ptr [esp+04h], eax 0x00000009 jmp 00007F450CC4A618h 0x0000000e pop eax 0x0000000f push 00000000h 0x00000011 push edx 0x00000012 call 00007F450CC4A608h 0x00000017 pop edx 0x00000018 mov dword ptr [esp+04h], edx 0x0000001c add dword ptr [esp+04h], 00000018h 0x00000024 inc edx 0x00000025 push edx 0x00000026 ret 0x00000027 pop edx 0x00000028 ret 0x00000029 jg 00007F450CC4A60Bh 0x0000002f lea ebx, dword ptr [ebp+1245B889h] 0x00000035 xchg eax, ebx 0x00000036 jmp 00007F450CC4A616h 0x0000003b push eax 0x0000003c push edi 0x0000003d push eax 0x0000003e push edx 0x0000003f push eax 0x00000040 push edx 0x00000041 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E30ACD second address: E30AD1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E30B70 second address: E30B95 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F450CC4A617h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a mov eax, dword ptr [esp+04h] 0x0000000e push ebx 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 popad 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E30B95 second address: E30BAB instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ebx 0x00000007 mov eax, dword ptr [eax] 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F450CC4AB1Ah 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E30BAB second address: E30C6B instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop eax 0x00000007 mov dword ptr [esp+04h], eax 0x0000000b je 00007F450CC4A618h 0x00000011 pop eax 0x00000012 mov esi, dword ptr [ebp+122D29A5h] 0x00000018 mov edi, dword ptr [ebp+122D28A9h] 0x0000001e push 00000003h 0x00000020 mov ecx, dword ptr [ebp+122D2A75h] 0x00000026 mov dword ptr [ebp+122D1C03h], edi 0x0000002c push 00000000h 0x0000002e mov dword ptr [ebp+122D2E22h], edi 0x00000034 push 00000003h 0x00000036 clc 0x00000037 push BF73C288h 0x0000003c jmp 00007F450CC4A610h 0x00000041 add dword ptr [esp], 008C3D78h 0x00000048 push 00000000h 0x0000004a push edi 0x0000004b call 00007F450CC4A608h 0x00000050 pop edi 0x00000051 mov dword ptr [esp+04h], edi 0x00000055 add dword ptr [esp+04h], 0000001Dh 0x0000005d inc edi 0x0000005e push edi 0x0000005f ret 0x00000060 pop edi 0x00000061 ret 0x00000062 lea ebx, dword ptr [ebp+1245B892h] 0x00000068 mov edx, 02DDB43Ah 0x0000006d xchg eax, ebx 0x0000006e push edi 0x0000006f jl 00007F450CC4A618h 0x00000075 jmp 00007F450CC4A612h 0x0000007a pop edi 0x0000007b push eax 0x0000007c jng 00007F450CC4A614h 0x00000082 pushad 0x00000083 jg 00007F450CC4A606h 0x00000089 push eax 0x0000008a push edx 0x0000008b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E30D05 second address: E30D2D instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F450CC4AB16h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b mov dword ptr [esp], eax 0x0000000e mov di, D5E0h 0x00000012 push 00000000h 0x00000014 mov esi, dword ptr [ebp+122D2AF9h] 0x0000001a call 00007F450CC4AB19h 0x0000001f pushad 0x00000020 push eax 0x00000021 push edx 0x00000022 push esi 0x00000023 pop esi 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E30D2D second address: E30D36 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E30D36 second address: E30D78 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007F450CC4AB16h 0x0000000a popad 0x0000000b popad 0x0000000c push eax 0x0000000d jmp 00007F450CC4AB24h 0x00000012 mov eax, dword ptr [esp+04h] 0x00000016 push edi 0x00000017 jc 00007F450CC4AB24h 0x0000001d jmp 00007F450CC4AB1Eh 0x00000022 pop edi 0x00000023 mov eax, dword ptr [eax] 0x00000025 pushad 0x00000026 push eax 0x00000027 push edx 0x00000028 pushad 0x00000029 popad 0x0000002a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E30D78 second address: E30D86 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jbe 00007F450CC4A606h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E4EC84 second address: E4EC8F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007F450CC4AB16h 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E4EC8F second address: E4EC94 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E4EC94 second address: E4EC9A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E4F243 second address: E4F273 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pushad 0x00000006 pushad 0x00000007 popad 0x00000008 jmp 00007F450CC4A617h 0x0000000d push ecx 0x0000000e pop ecx 0x0000000f popad 0x00000010 jng 00007F450CC4A612h 0x00000016 jo 00007F450CC4A606h 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E4F273 second address: E4F292 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 jmp 00007F450CC4AB1Bh 0x0000000b jmp 00007F450CC4AB1Eh 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E4F411 second address: E4F41D instructions: 0x00000000 rdtsc 0x00000002 jl 00007F450CC4A606h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E4F56D second address: E4F573 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E4F573 second address: E4F5B1 instructions: 0x00000000 rdtsc 0x00000002 jg 00007F450CC4A606h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d pushad 0x0000000e pushad 0x0000000f popad 0x00000010 jo 00007F450CC4A606h 0x00000016 jmp 00007F450CC4A60Dh 0x0000001b jmp 00007F450CC4A615h 0x00000020 popad 0x00000021 pushad 0x00000022 push edx 0x00000023 pop edx 0x00000024 push eax 0x00000025 push edx 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E4F727 second address: E4F72D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E4F8AF second address: E4F8C2 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jnl 00007F450CC4A608h 0x0000000c push edi 0x0000000d pop edi 0x0000000e pushad 0x0000000f push esi 0x00000010 pop esi 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E4F8C2 second address: E4F8D1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jp 00007F450CC4AB16h 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E1AA3F second address: E1AA48 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E1AA48 second address: E1AA4D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E1AA4D second address: E1AA75 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F450CC4A614h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F450CC4A60Eh 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E50578 second address: E5059E instructions: 0x00000000 rdtsc 0x00000002 js 00007F450CC4AB1Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007F450CC4AB24h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E5059E second address: E505A2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E505A2 second address: E505E0 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 jmp 00007F450CC4AB1Eh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop edx 0x0000000c pop eax 0x0000000d ja 00007F450CC4AB48h 0x00000013 jmp 00007F450CC4AB1Ah 0x00000018 push eax 0x00000019 push edx 0x0000001a jmp 00007F450CC4AB26h 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E505E0 second address: E505EA instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F450CC4A606h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E50C9F second address: E50CBA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F450CC4AB27h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E5AE1D second address: E5AE2C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 jnc 00007F450CC4A606h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E5B115 second address: E5B11A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E5B11A second address: E5B152 instructions: 0x00000000 rdtsc 0x00000002 ja 00007F450CC4A623h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push ecx 0x0000000b push eax 0x0000000c jp 00007F450CC4A606h 0x00000012 pushad 0x00000013 popad 0x00000014 pop eax 0x00000015 push eax 0x00000016 push edx 0x00000017 pushad 0x00000018 popad 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E5B152 second address: E5B156 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E5B2A3 second address: E5B2A9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E5B2A9 second address: E5B2C4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F450CC4AB1Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F450CC4AB1Bh 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E5D11E second address: E5D124 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E5D124 second address: E5D128 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E5D773 second address: E5D777 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E5D859 second address: E5D85D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E5D94F second address: E5D973 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 push eax 0x00000008 push edi 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F450CC4A619h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E5D9E3 second address: E5DA03 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F450CC4AB1Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F450CC4AB1Dh 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E5EB2F second address: E5EB60 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F450CC4A614h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F450CC4A617h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E5EB60 second address: E5EBF8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F450CC4AB29h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a nop 0x0000000b push 00000000h 0x0000000d push ebx 0x0000000e call 00007F450CC4AB18h 0x00000013 pop ebx 0x00000014 mov dword ptr [esp+04h], ebx 0x00000018 add dword ptr [esp+04h], 00000019h 0x00000020 inc ebx 0x00000021 push ebx 0x00000022 ret 0x00000023 pop ebx 0x00000024 ret 0x00000025 movsx edi, si 0x00000028 mov edi, dword ptr [ebp+122D1B19h] 0x0000002e push 00000000h 0x00000030 and edi, dword ptr [ebp+122D2969h] 0x00000036 push 00000000h 0x00000038 push 00000000h 0x0000003a push ebp 0x0000003b call 00007F450CC4AB18h 0x00000040 pop ebp 0x00000041 mov dword ptr [esp+04h], ebp 0x00000045 add dword ptr [esp+04h], 00000018h 0x0000004d inc ebp 0x0000004e push ebp 0x0000004f ret 0x00000050 pop ebp 0x00000051 ret 0x00000052 mov esi, dword ptr [ebp+122D26D0h] 0x00000058 mov esi, dword ptr [ebp+122D29D5h] 0x0000005e xchg eax, ebx 0x0000005f push eax 0x00000060 push edx 0x00000061 jmp 00007F450CC4AB26h 0x00000066 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E5FC65 second address: E5FCBD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 jp 00007F450CC4A61Ah 0x0000000b popad 0x0000000c nop 0x0000000d pushad 0x0000000e mov eax, dword ptr [ebp+1247F65Bh] 0x00000014 sub edx, dword ptr [ebp+122D3219h] 0x0000001a popad 0x0000001b push 00000000h 0x0000001d mov di, dx 0x00000020 push 00000000h 0x00000022 jl 00007F450CC4A60Ch 0x00000028 jmp 00007F450CC4A60Fh 0x0000002d push eax 0x0000002e push eax 0x0000002f push edx 0x00000030 push eax 0x00000031 push edi 0x00000032 pop edi 0x00000033 pop eax 0x00000034 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E60462 second address: E60481 instructions: 0x00000000 rdtsc 0x00000002 jng 00007F450CC4AB25h 0x00000008 jmp 00007F450CC4AB1Fh 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push ebx 0x00000011 push eax 0x00000012 push edx 0x00000013 push esi 0x00000014 pop esi 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E61C42 second address: E61C48 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E60F9A second address: E60F9E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E61C48 second address: E61C5E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F450CC4A612h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E60F9E second address: E60FAC instructions: 0x00000000 rdtsc 0x00000002 jno 00007F450CC4AB16h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E61C5E second address: E61C62 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E60FAC second address: E60FB0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E61C62 second address: E61C85 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F450CC4A617h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E61C85 second address: E61C9E instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F450CC4AB21h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E61C9E second address: E61D01 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F450CC4A613h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a nop 0x0000000b push 00000000h 0x0000000d push ebp 0x0000000e call 00007F450CC4A608h 0x00000013 pop ebp 0x00000014 mov dword ptr [esp+04h], ebp 0x00000018 add dword ptr [esp+04h], 00000016h 0x00000020 inc ebp 0x00000021 push ebp 0x00000022 ret 0x00000023 pop ebp 0x00000024 ret 0x00000025 mov esi, dword ptr [ebp+122D205Fh] 0x0000002b push 00000000h 0x0000002d push edx 0x0000002e mov dword ptr [ebp+122D2195h], edx 0x00000034 pop esi 0x00000035 add di, F52Ch 0x0000003a push 00000000h 0x0000003c sub edi, dword ptr [ebp+122D297Dh] 0x00000042 mov esi, 4EA567A9h 0x00000047 push eax 0x00000048 pushad 0x00000049 je 00007F450CC4A60Ch 0x0000004f push eax 0x00000050 push edx 0x00000051 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E667DA second address: E667DF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E677E0 second address: E677EE instructions: 0x00000000 rdtsc 0x00000002 jg 00007F450CC4A606h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E677EE second address: E677F2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E677F2 second address: E67856 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F450CC4A60Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a mov dword ptr [esp], eax 0x0000000d push 00000000h 0x0000000f push ebx 0x00000010 call 00007F450CC4A608h 0x00000015 pop ebx 0x00000016 mov dword ptr [esp+04h], ebx 0x0000001a add dword ptr [esp+04h], 00000019h 0x00000022 inc ebx 0x00000023 push ebx 0x00000024 ret 0x00000025 pop ebx 0x00000026 ret 0x00000027 mov bx, si 0x0000002a push 00000000h 0x0000002c and bl, 0000002Eh 0x0000002f push 00000000h 0x00000031 or edi, dword ptr [ebp+122D2E28h] 0x00000037 jmp 00007F450CC4A616h 0x0000003c xchg eax, esi 0x0000003d jbe 00007F450CC4A61Ch 0x00000043 push eax 0x00000044 push edx 0x00000045 push ebx 0x00000046 pop ebx 0x00000047 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E686CF second address: E686D7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E679C1 second address: E679DF instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 jns 00007F450CC4A606h 0x00000009 pop edi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 jmp 00007F450CC4A60Bh 0x00000015 pushad 0x00000016 popad 0x00000017 popad 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E679DF second address: E679E9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jbe 00007F450CC4AB16h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E688E7 second address: E688ED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E695E5 second address: E695E9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E679E9 second address: E67A76 instructions: 0x00000000 rdtsc 0x00000002 jc 00007F450CC4A606h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c nop 0x0000000d mov edi, dword ptr [ebp+122D233Eh] 0x00000013 push dword ptr fs:[00000000h] 0x0000001a push 00000000h 0x0000001c push ecx 0x0000001d call 00007F450CC4A608h 0x00000022 pop ecx 0x00000023 mov dword ptr [esp+04h], ecx 0x00000027 add dword ptr [esp+04h], 00000019h 0x0000002f inc ecx 0x00000030 push ecx 0x00000031 ret 0x00000032 pop ecx 0x00000033 ret 0x00000034 mov dword ptr fs:[00000000h], esp 0x0000003b pushad 0x0000003c jbe 00007F450CC4A606h 0x00000042 movsx eax, cx 0x00000045 popad 0x00000046 mov eax, dword ptr [ebp+122D0B9Dh] 0x0000004c add dword ptr [ebp+122D2730h], esi 0x00000052 push FFFFFFFFh 0x00000054 push 00000000h 0x00000056 push eax 0x00000057 call 00007F450CC4A608h 0x0000005c pop eax 0x0000005d mov dword ptr [esp+04h], eax 0x00000061 add dword ptr [esp+04h], 0000001Dh 0x00000069 inc eax 0x0000006a push eax 0x0000006b ret 0x0000006c pop eax 0x0000006d ret 0x0000006e mov ebx, dword ptr [ebp+122DB252h] 0x00000074 nop 0x00000075 push eax 0x00000076 push edx 0x00000077 push eax 0x00000078 push edx 0x00000079 push eax 0x0000007a push edx 0x0000007b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E695E9 second address: E695EF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E67A76 second address: E67A7A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E68987 second address: E6898C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E695EF second address: E695F5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E67A7A second address: E67A80 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E67A80 second address: E67A8A instructions: 0x00000000 rdtsc 0x00000002 js 00007F450CC4A60Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E6975E second address: E6978B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F450CC4AB23h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F450CC4AB24h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E6B522 second address: E6B526 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E6C5D1 second address: E6C5F5 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F450CC4AB16h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F450CC4AB27h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E6C5F5 second address: E6C5FA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E6A6AA second address: E6A6B3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E6C5FA second address: E6C67D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007F450CC4A606h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d nop 0x0000000e movsx ebx, di 0x00000011 push 00000000h 0x00000013 push 00000000h 0x00000015 push edi 0x00000016 call 00007F450CC4A608h 0x0000001b pop edi 0x0000001c mov dword ptr [esp+04h], edi 0x00000020 add dword ptr [esp+04h], 0000001Dh 0x00000028 inc edi 0x00000029 push edi 0x0000002a ret 0x0000002b pop edi 0x0000002c ret 0x0000002d mov dword ptr [ebp+122D1A0Ch], edx 0x00000033 jmp 00007F450CC4A60Fh 0x00000038 push 00000000h 0x0000003a push esi 0x0000003b jnp 00007F450CC4A609h 0x00000041 pop ebx 0x00000042 xchg eax, esi 0x00000043 jmp 00007F450CC4A60Ch 0x00000048 push eax 0x00000049 push eax 0x0000004a push edx 0x0000004b pushad 0x0000004c jmp 00007F450CC4A616h 0x00000051 push eax 0x00000052 push edx 0x00000053 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E6A6B3 second address: E6A6D7 instructions: 0x00000000 rdtsc 0x00000002 je 00007F450CC4AB16h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f je 00007F450CC4AB16h 0x00000015 jmp 00007F450CC4AB1Eh 0x0000001a popad 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E6C67D second address: E6C682 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E6A6D7 second address: E6A6DD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E6A6DD second address: E6A6E1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E6A6E1 second address: E6A6E5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E6D7E8 second address: E6D7FD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F450CC4A611h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E6A794 second address: E6A7A2 instructions: 0x00000000 rdtsc 0x00000002 je 00007F450CC4AB16h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E70804 second address: E70818 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F450CC4A60Fh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E70818 second address: E70893 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 jmp 00007F450CC4AB21h 0x0000000d nop 0x0000000e mov ebx, dword ptr [ebp+122D1AA2h] 0x00000014 push 00000000h 0x00000016 push 00000000h 0x00000018 push esi 0x00000019 call 00007F450CC4AB18h 0x0000001e pop esi 0x0000001f mov dword ptr [esp+04h], esi 0x00000023 add dword ptr [esp+04h], 0000001Bh 0x0000002b inc esi 0x0000002c push esi 0x0000002d ret 0x0000002e pop esi 0x0000002f ret 0x00000030 push 00000000h 0x00000032 mov ebx, dword ptr [ebp+122D2A89h] 0x00000038 xchg eax, esi 0x00000039 jl 00007F450CC4AB20h 0x0000003f pushad 0x00000040 jo 00007F450CC4AB16h 0x00000046 push edx 0x00000047 pop edx 0x00000048 popad 0x00000049 push eax 0x0000004a push eax 0x0000004b push edx 0x0000004c pushad 0x0000004d jno 00007F450CC4AB16h 0x00000053 jmp 00007F450CC4AB22h 0x00000058 popad 0x00000059 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E70893 second address: E7089D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jl 00007F450CC4A606h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E7089D second address: E708A1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E718BD second address: E71908 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop eax 0x00000007 mov dword ptr [esp], eax 0x0000000a add bx, 371Ah 0x0000000f push 00000000h 0x00000011 mov ebx, 1C91E7DDh 0x00000016 push 00000000h 0x00000018 push 00000000h 0x0000001a push esi 0x0000001b call 00007F450CC4A608h 0x00000020 pop esi 0x00000021 mov dword ptr [esp+04h], esi 0x00000025 add dword ptr [esp+04h], 00000016h 0x0000002d inc esi 0x0000002e push esi 0x0000002f ret 0x00000030 pop esi 0x00000031 ret 0x00000032 cmc 0x00000033 push eax 0x00000034 pushad 0x00000035 push eax 0x00000036 push edx 0x00000037 jmp 00007F450CC4A610h 0x0000003c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E729E4 second address: E729F5 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F450CC4AB16h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E729F5 second address: E72A00 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007F450CC4A606h 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E6E8B0 second address: E6E8B5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E6E8B5 second address: E6E8BB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E748EC second address: E748F1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E748F1 second address: E748F7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E6E8BB second address: E6E8C8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E6E8C8 second address: E6E8CE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E75907 second address: E759B4 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 mov dword ptr [esp], eax 0x00000009 push 00000000h 0x0000000b push ebx 0x0000000c call 00007F450CC4AB18h 0x00000011 pop ebx 0x00000012 mov dword ptr [esp+04h], ebx 0x00000016 add dword ptr [esp+04h], 0000001Dh 0x0000001e inc ebx 0x0000001f push ebx 0x00000020 ret 0x00000021 pop ebx 0x00000022 ret 0x00000023 jmp 00007F450CC4AB28h 0x00000028 and ebx, 7EFE7F4Dh 0x0000002e push 00000000h 0x00000030 sub dword ptr [ebp+122D2EC5h], eax 0x00000036 push 00000000h 0x00000038 push 00000000h 0x0000003a push edx 0x0000003b call 00007F450CC4AB18h 0x00000040 pop edx 0x00000041 mov dword ptr [esp+04h], edx 0x00000045 add dword ptr [esp+04h], 0000001Dh 0x0000004d inc edx 0x0000004e push edx 0x0000004f ret 0x00000050 pop edx 0x00000051 ret 0x00000052 or dword ptr [ebp+122D2CD4h], edi 0x00000058 xchg eax, esi 0x00000059 pushad 0x0000005a jmp 00007F450CC4AB27h 0x0000005f push eax 0x00000060 push edx 0x00000061 jmp 00007F450CC4AB21h 0x00000066 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E6F983 second address: E6F9A1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F450CC4A612h 0x00000009 popad 0x0000000a pop esi 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push ebx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E6F9A1 second address: E6F9A6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E7969F second address: E796C4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F450CC4A610h 0x00000009 jmp 00007F450CC4A611h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E7A0FC second address: E7A102 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E7E5F0 second address: E7E60F instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pushad 0x00000004 popad 0x00000005 jmp 00007F450CC4A615h 0x0000000a pop edx 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E7EA35 second address: E7EA40 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007F450CC4AB16h 0x0000000a pop esi 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E7EA40 second address: E7EA51 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F450CC4A60Bh 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E7EA51 second address: E7EA5B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007F450CC4AB16h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E70A4C second address: E70A56 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jp 00007F450CC4A606h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E71A59 second address: E71A5D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E71A5D second address: E71A6C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b push eax 0x0000000c pop eax 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E71A6C second address: E71A71 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E71A71 second address: E71A76 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E71B29 second address: E71B2D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E71B2D second address: E71B33 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E71B33 second address: E71B44 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F450CC4AB1Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E72BB1 second address: E72BBB instructions: 0x00000000 rdtsc 0x00000002 jng 00007F450CC4A60Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E73A4A second address: E73A51 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edx 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E75AF8 second address: E75AFD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E75AFD second address: E75B1F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F450CC4AB26h 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d pushad 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E851C6 second address: E851D1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007F450CC4A606h 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E8C7D5 second address: E8C7DF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E8C7DF second address: E8C7E3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E8B500 second address: E8B516 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 je 00007F450CC4AB16h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push ecx 0x0000000f pop ecx 0x00000010 jc 00007F450CC4AB16h 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E8BD7E second address: E8BD84 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E8BD84 second address: E8BD8A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E8BD8A second address: E8BD8F instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E8BD8F second address: E8BD9A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 push eax 0x00000008 push edx 0x00000009 push esi 0x0000000a pop esi 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E8BD9A second address: E8BD9E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E8BF3F second address: E8BF5A instructions: 0x00000000 rdtsc 0x00000002 je 00007F450CC4AB22h 0x00000008 pushad 0x00000009 push edx 0x0000000a pop edx 0x0000000b push ecx 0x0000000c pop ecx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E8C0C0 second address: E8C0CD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 jnl 00007F450CC4A606h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E8C0CD second address: E8C0DE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F450CC4AB1Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E8C0DE second address: E8C0F5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F450CC4A611h 0x00000009 push eax 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E8C0F5 second address: E8C0F9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E92C0A second address: E92C18 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pushad 0x00000006 jno 00007F450CC4A606h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E919D4 second address: E919FA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F450CC4AB1Fh 0x00000007 jmp 00007F450CC4AB20h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E91B7C second address: E91B81 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E91B81 second address: E91B86 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E91B86 second address: E91B8C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E92496 second address: E9249A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E9249A second address: E9249E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E9249E second address: E924C8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 js 00007F450CC4AB1Ch 0x0000000e je 00007F450CC4AB16h 0x00000014 js 00007F450CC4AB22h 0x0000001a jl 00007F450CC4AB16h 0x00000020 jng 00007F450CC4AB16h 0x00000026 push eax 0x00000027 push edx 0x00000028 push edx 0x00000029 pop edx 0x0000002a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E924C8 second address: E924CC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E95832 second address: E95836 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E95836 second address: E95842 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007F450CC4A606h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E95842 second address: E95847 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E95847 second address: E9585B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 push edx 0x00000007 pop edx 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push ecx 0x0000000c jbe 00007F450CC4A60Eh 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E1FC14 second address: E1FC38 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jbe 00007F450CC4AB2Bh 0x0000000b jmp 00007F450CC4AB25h 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E1FC38 second address: E1FC42 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007F450CC4A606h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E1FC42 second address: E1FC46 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E1FC46 second address: E1FC77 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jmp 00007F450CC4A614h 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007F450CC4A612h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E9FAAA second address: E9FAC0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jnp 00007F450CC4AB1Eh 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E9FAC0 second address: E9FAC5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E9FAC5 second address: E9FAE4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F450CC4AB29h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E9FC1D second address: E9FC2A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 je 00007F450CC4A60Ch 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E9FD80 second address: E9FD9C instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F450CC4AB24h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E9FD9C second address: E9FDA0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E9FDA0 second address: E9FDA6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EA00A3 second address: EA00A7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EA00A7 second address: EA00D8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F450CC4AB1Ch 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jl 00007F450CC4AB1Eh 0x00000011 jg 00007F450CC4AB16h 0x00000017 push esi 0x00000018 pop esi 0x00000019 popad 0x0000001a jc 00007F450CC4AB59h 0x00000020 push eax 0x00000021 push edx 0x00000022 pushad 0x00000023 popad 0x00000024 jns 00007F450CC4AB16h 0x0000002a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E4605A second address: E4606B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F450CC4A60Bh 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E4606B second address: E4606F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E4606F second address: E46079 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E46079 second address: E4608F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F450CC4AB22h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E4608F second address: E46093 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E46093 second address: E460A7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push esi 0x0000000d jl 00007F450CC4AB16h 0x00000013 pop esi 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E460A7 second address: E460AD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E460AD second address: E460B3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E460B3 second address: E460B7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E460B7 second address: E460BD instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EA09A0 second address: EA09C6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push edx 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop ebx 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F450CC4A617h 0x00000012 push edi 0x00000013 pop edi 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EA09C6 second address: EA09CE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EA09CE second address: EA09D5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EA09D5 second address: EA09DB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E9F1F3 second address: E9F1F8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EA4391 second address: EA43BB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F450CC4AB1Fh 0x0000000e jmp 00007F450CC4AB22h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EA43BB second address: EA43C3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EA43C3 second address: EA43D3 instructions: 0x00000000 rdtsc 0x00000002 js 00007F450CC4AB22h 0x00000008 jnp 00007F450CC4AB16h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E643FA second address: E64400 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E648C4 second address: E648D7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F450CC4AB1Fh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E648D7 second address: E648FA instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push ecx 0x0000000a pushad 0x0000000b jmp 00007F450CC4A616h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E64A10 second address: E64A15 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E64A15 second address: E64A1B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E64B9B second address: E64BA6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnl 00007F450CC4AB16h 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E64C7E second address: E64C84 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E6517E second address: E6519E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F450CC4AB1Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F450CC4AB20h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E652AD second address: E652C8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F450CC4A617h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E652C8 second address: E652E6 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 jmp 00007F450CC4AB1Eh 0x00000008 pop ebx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f jnp 00007F450CC4AB16h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E6559B second address: E6565D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop ebx 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 push ebx 0x0000000a pop ebx 0x0000000b jmp 00007F450CC4A619h 0x00000010 popad 0x00000011 pop edx 0x00000012 nop 0x00000013 or dx, C629h 0x00000018 lea eax, dword ptr [ebp+1248F021h] 0x0000001e push 00000000h 0x00000020 push edi 0x00000021 call 00007F450CC4A608h 0x00000026 pop edi 0x00000027 mov dword ptr [esp+04h], edi 0x0000002b add dword ptr [esp+04h], 0000001Dh 0x00000033 inc edi 0x00000034 push edi 0x00000035 ret 0x00000036 pop edi 0x00000037 ret 0x00000038 pushad 0x00000039 jmp 00007F450CC4A616h 0x0000003e popad 0x0000003f jns 00007F450CC4A620h 0x00000045 nop 0x00000046 je 00007F450CC4A60Eh 0x0000004c push edi 0x0000004d jbe 00007F450CC4A606h 0x00000053 pop edi 0x00000054 push eax 0x00000055 push eax 0x00000056 push edx 0x00000057 pushad 0x00000058 jmp 00007F450CC4A619h 0x0000005d jns 00007F450CC4A606h 0x00000063 popad 0x00000064 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E6565D second address: E4605A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F450CC4AB28h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a push 00000000h 0x0000000c push ebp 0x0000000d call 00007F450CC4AB18h 0x00000012 pop ebp 0x00000013 mov dword ptr [esp+04h], ebp 0x00000017 add dword ptr [esp+04h], 00000019h 0x0000001f inc ebp 0x00000020 push ebp 0x00000021 ret 0x00000022 pop ebp 0x00000023 ret 0x00000024 mov dx, bx 0x00000027 call dword ptr [ebp+122D1A5Bh] 0x0000002d push eax 0x0000002e push edx 0x0000002f jmp 00007F450CC4AB1Eh 0x00000034 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EA76EC second address: EA76F2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EA76F2 second address: EA7712 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jo 00007F450CC4AB16h 0x0000000a popad 0x0000000b jmp 00007F450CC4AB25h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EA7297 second address: EA72CE instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 jmp 00007F450CC4A612h 0x00000008 pop ecx 0x00000009 je 00007F450CC4A619h 0x0000000f push ecx 0x00000010 pop ecx 0x00000011 jmp 00007F450CC4A611h 0x00000016 pop edx 0x00000017 pop eax 0x00000018 push eax 0x00000019 push edx 0x0000001a push eax 0x0000001b push edx 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EA72CE second address: EA72D2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EA72D2 second address: EA72E6 instructions: 0x00000000 rdtsc 0x00000002 jno 00007F450CC4A606h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007F450CC4A60Ah 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EA72E6 second address: EA72EB instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EA741D second address: EA7421 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EA9E29 second address: EA9E3F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F450CC4AB22h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EA9E3F second address: EA9E43 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EA9E43 second address: EA9E4B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EA9E4B second address: EA9E56 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 jo 00007F450CC4A606h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EA9E56 second address: EA9E67 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pop edx 0x00000006 pop eax 0x00000007 pushad 0x00000008 pushad 0x00000009 push ebx 0x0000000a pop ebx 0x0000000b pushad 0x0000000c popad 0x0000000d popad 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EA9E67 second address: EA9E8D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F450CC4A60Fh 0x00000009 pushad 0x0000000a popad 0x0000000b popad 0x0000000c pushad 0x0000000d jne 00007F450CC4A606h 0x00000013 push ebx 0x00000014 pop ebx 0x00000015 pushad 0x00000016 popad 0x00000017 popad 0x00000018 push eax 0x00000019 push edx 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EA9E8D second address: EA9E9F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F450CC4AB1Eh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EAA132 second address: EAA178 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ebx 0x00000009 push edi 0x0000000a pop edi 0x0000000b jmp 00007F450CC4A60Bh 0x00000010 pop ebx 0x00000011 pushad 0x00000012 push edi 0x00000013 pop edi 0x00000014 pushad 0x00000015 popad 0x00000016 jmp 00007F450CC4A619h 0x0000001b popad 0x0000001c popad 0x0000001d pushad 0x0000001e push eax 0x0000001f push edx 0x00000020 jmp 00007F450CC4A60Ah 0x00000025 push ebx 0x00000026 pop ebx 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EADAAA second address: EADAB1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop eax 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EADAB1 second address: EADAD6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F450CC4A613h 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F450CC4A60Eh 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EADD73 second address: EADD78 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EAE02E second address: EAE048 instructions: 0x00000000 rdtsc 0x00000002 jng 00007F450CC4A606h 0x00000008 push esi 0x00000009 pop esi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jno 00007F450CC4A60Ch 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EB15A9 second address: EB15AF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EB15AF second address: EB15D9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 jmp 00007F450CC4A611h 0x0000000d jng 00007F450CC4A606h 0x00000013 pop eax 0x00000014 jp 00007F450CC4A60Ah 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EB1722 second address: EB1735 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F450CC4AB1Eh 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EB1AE3 second address: EB1B05 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007F450CC4A618h 0x0000000a pushad 0x0000000b pushad 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EB1B05 second address: EB1B33 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 popad 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F450CC4AB28h 0x00000010 jmp 00007F450CC4AB1Bh 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EB1B33 second address: EB1B3D instructions: 0x00000000 rdtsc 0x00000002 je 00007F450CC4A606h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EB1CB7 second address: EB1CC1 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F450CC4AB1Eh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EB1CC1 second address: EB1CDC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a jmp 00007F450CC4A611h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EB1CDC second address: EB1CF2 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F450CC4AB16h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 js 00007F450CC4AB16h 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EB1CF2 second address: EB1D0B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F450CC4A615h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EB1D0B second address: EB1D11 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EB68DD second address: EB68E1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EB68E1 second address: EB68E7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EB68E7 second address: EB68F2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push edi 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EB68F2 second address: EB68F7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EB6A58 second address: EB6A62 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F450CC4A606h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EB6A62 second address: EB6A7C instructions: 0x00000000 rdtsc 0x00000002 jno 00007F450CC4AB24h 0x00000008 push eax 0x00000009 push edx 0x0000000a push ecx 0x0000000b pop ecx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EB6A7C second address: EB6A86 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F450CC4A606h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EB74A8 second address: EB74C3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F450CC4AB27h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EB74C3 second address: EB74C7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EB74C7 second address: EB74CD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E15A85 second address: E15A9B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F450CC4A612h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E15A9B second address: E15AAC instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pushad 0x00000004 popad 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c pop edx 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E15AAC second address: E15AD9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F450CC4A611h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jmp 00007F450CC4A60Eh 0x00000010 jp 00007F450CC4A60Ch 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EC116D second address: EC1173 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EC1173 second address: EC1182 instructions: 0x00000000 rdtsc 0x00000002 jng 00007F450CC4A606h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EC1182 second address: EC11AD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007F450CC4AB16h 0x0000000a jg 00007F450CC4AB16h 0x00000010 popad 0x00000011 popad 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007F450CC4AB27h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EC11AD second address: EC11B9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jno 00007F450CC4A606h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EC11B9 second address: EC11BD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EC17B5 second address: EC17BA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EC17BA second address: EC17BF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EC17BF second address: EC17C5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EC17C5 second address: EC17CD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EC1FCE second address: EC1FF0 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pushad 0x00000004 popad 0x00000005 jns 00007F450CC4A606h 0x0000000b pop ecx 0x0000000c pushad 0x0000000d jmp 00007F450CC4A60Dh 0x00000012 jp 00007F450CC4A606h 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EC79FE second address: EC7A02 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EC7A02 second address: EC7A1A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F450CC4A614h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EC911B second address: EC9121 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: ECC59C second address: ECC5BD instructions: 0x00000000 rdtsc 0x00000002 js 00007F450CC4A606h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d jmp 00007F450CC4A612h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: ECC5BD second address: ECC5C3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: ECC5C3 second address: ECC5CE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007F450CC4A606h 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: ECC5CE second address: ECC5D4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: ECC5D4 second address: ECC5D8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: ECC716 second address: ECC72E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F450CC4AB24h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: ECCB65 second address: ECCB86 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 pop eax 0x00000008 popad 0x00000009 pushad 0x0000000a pushad 0x0000000b popad 0x0000000c jmp 00007F450CC4A60Eh 0x00000011 jno 00007F450CC4A606h 0x00000017 popad 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: ED3B3E second address: ED3B49 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: ED3CA1 second address: ED3CAD instructions: 0x00000000 rdtsc 0x00000002 js 00007F450CC4A606h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: ED3CAD second address: ED3CD6 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 jnc 00007F450CC4AB16h 0x00000009 jmp 00007F450CC4AB27h 0x0000000e pop ecx 0x0000000f jnp 00007F450CC4AB22h 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: ED3CD6 second address: ED3CDC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: ED3E39 second address: ED3E3E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: ED3E3E second address: ED3E5E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F450CC4A615h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push edi 0x0000000a push eax 0x0000000b push edx 0x0000000c push ecx 0x0000000d pop ecx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: ED3E5E second address: ED3E62 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: ED413E second address: ED414E instructions: 0x00000000 rdtsc 0x00000002 js 00007F450CC4A606h 0x00000008 jp 00007F450CC4A606h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: ED414E second address: ED4168 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jg 00007F450CC4AB16h 0x0000000a jmp 00007F450CC4AB20h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EE0370 second address: EE0374 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EE0069 second address: EE0072 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EE0072 second address: EE0099 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F450CC4A612h 0x00000007 jp 00007F450CC4A608h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push ebx 0x00000010 push eax 0x00000011 push edx 0x00000012 jo 00007F450CC4A606h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EE0099 second address: EE009D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EE009D second address: EE00A7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EE00A7 second address: EE00AD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EEB651 second address: EEB669 instructions: 0x00000000 rdtsc 0x00000002 js 00007F450CC4A612h 0x00000008 pushad 0x00000009 popad 0x0000000a jmp 00007F450CC4A60Ah 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 popad 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EEB669 second address: EEB6A3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F450CC4AB20h 0x00000007 jo 00007F450CC4AB16h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pop edx 0x00000010 pop eax 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 jne 00007F450CC4AB16h 0x0000001a jg 00007F450CC4AB16h 0x00000020 push eax 0x00000021 pop eax 0x00000022 jo 00007F450CC4AB16h 0x00000028 popad 0x00000029 push eax 0x0000002a push edx 0x0000002b pushad 0x0000002c popad 0x0000002d push esi 0x0000002e pop esi 0x0000002f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EEB6A3 second address: EEB6B7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F450CC4A610h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EEB6B7 second address: EEB6BD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EEB6BD second address: EEB6C1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EED256 second address: EED25A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EED25A second address: EED25E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EED25E second address: EED26F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push ecx 0x00000008 pushad 0x00000009 je 00007F450CC4AB16h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F046F5 second address: F046F9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F046F9 second address: F046FF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F046FF second address: F04705 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F04705 second address: F0470D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F0470D second address: F04711 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F05FBD second address: F05FC2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F0A18A second address: F0A196 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F450CC4A606h 0x00000008 push edx 0x00000009 pop edx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F0A196 second address: F0A19C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F0AA92 second address: F0AABF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 push esi 0x00000007 pop esi 0x00000008 popad 0x00000009 jmp 00007F450CC4A619h 0x0000000e pop ecx 0x0000000f jo 00007F450CC4A614h 0x00000015 push eax 0x00000016 push edx 0x00000017 push ecx 0x00000018 pop ecx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F1DBD9 second address: F1DBDF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F1DBDF second address: F1DBE3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F1DBE3 second address: F1DBE9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F1C2AF second address: F1C2B3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F1C2B3 second address: F1C2B9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F2C06A second address: F2C0AE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 jmp 00007F450CC4A614h 0x0000000e jl 00007F450CC4A624h 0x00000014 jmp 00007F450CC4A618h 0x00000019 jne 00007F450CC4A606h 0x0000001f pushad 0x00000020 push eax 0x00000021 push edx 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F2BF2D second address: F2BF32 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F301E5 second address: F301F1 instructions: 0x00000000 rdtsc 0x00000002 je 00007F450CC4A60Eh 0x00000008 push eax 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F2FF19 second address: F2FF1E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E1E0C6 second address: E1E0F1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F450CC4A617h 0x00000009 jmp 00007F450CC4A60Fh 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F44528 second address: F4452C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F4452C second address: F44532 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F4491E second address: F4492A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push ecx 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F47E29 second address: F47E33 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F450CC4A60Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F47E33 second address: F47E3E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push ebx 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F48139 second address: F48143 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jng 00007F450CC4A606h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F48143 second address: F48147 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F48438 second address: F4845B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jmp 00007F450CC4A60Ch 0x0000000e mov eax, dword ptr [esp+04h] 0x00000012 push eax 0x00000013 push edx 0x00000014 jc 00007F450CC4A608h 0x0000001a push eax 0x0000001b pop eax 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F4963A second address: F4963E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F4963E second address: F49644 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F49644 second address: F4964D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push esi 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F4CDA7 second address: F4CDB1 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F450CC4A606h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E5FAA6 second address: E5FABF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F450CC4AB25h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55D0314 second address: 55D0319 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55D0319 second address: 55D032A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F450CC4AB1Dh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55D032A second address: 55D03B9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F450CC4A611h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebp 0x0000000c pushad 0x0000000d push ecx 0x0000000e pushfd 0x0000000f jmp 00007F450CC4A613h 0x00000014 or ax, D4BEh 0x00000019 jmp 00007F450CC4A619h 0x0000001e popfd 0x0000001f pop eax 0x00000020 pushfd 0x00000021 jmp 00007F450CC4A611h 0x00000026 and cx, BEF6h 0x0000002b jmp 00007F450CC4A611h 0x00000030 popfd 0x00000031 popad 0x00000032 mov ebp, esp 0x00000034 pushad 0x00000035 movzx ecx, di 0x00000038 push eax 0x00000039 push edx 0x0000003a jmp 00007F450CC4A60Fh 0x0000003f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55D03B9 second address: 55D03F2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F450CC4AB28h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a mov edx, dword ptr [ebp+0Ch] 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007F450CC4AB27h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55D03F2 second address: 55D040A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F450CC4A614h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55D040A second address: 55D040E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55F0694 second address: 55F0698 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55F0698 second address: 55F069C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55F069C second address: 55F06A2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55F06A2 second address: 55F06EE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007F450CC4AB22h 0x00000008 pop ecx 0x00000009 mov edx, 3AF94276h 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 push eax 0x00000012 jmp 00007F450CC4AB1Ch 0x00000017 xchg eax, ebp 0x00000018 jmp 00007F450CC4AB20h 0x0000001d mov ebp, esp 0x0000001f push eax 0x00000020 push edx 0x00000021 push eax 0x00000022 push edx 0x00000023 jmp 00007F450CC4AB1Ah 0x00000028 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55F06EE second address: 55F06FD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F450CC4A60Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55F06FD second address: 55F0703 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55F0703 second address: 55F0707 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55F0707 second address: 55F074E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ecx 0x00000009 jmp 00007F450CC4AB1Ch 0x0000000e mov dword ptr [esp], ecx 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 mov al, bh 0x00000016 pushfd 0x00000017 jmp 00007F450CC4AB26h 0x0000001c or ecx, 16464B88h 0x00000022 jmp 00007F450CC4AB1Bh 0x00000027 popfd 0x00000028 popad 0x00000029 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55F074E second address: 55F0754 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55F0754 second address: 55F0758 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55F0758 second address: 55F0791 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F450CC4A60Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, esi 0x0000000c jmp 00007F450CC4A616h 0x00000011 push eax 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007F450CC4A60Eh 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55F0791 second address: 55F0797 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55F0797 second address: 55F07C1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, esi 0x00000009 jmp 00007F450CC4A619h 0x0000000e lea eax, dword ptr [ebp-04h] 0x00000011 pushad 0x00000012 push eax 0x00000013 push edx 0x00000014 push ecx 0x00000015 pop edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55F07C1 second address: 55F07F5 instructions: 0x00000000 rdtsc 0x00000002 mov esi, 4764CAB5h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jmp 00007F450CC4AB22h 0x0000000e popad 0x0000000f nop 0x00000010 jmp 00007F450CC4AB20h 0x00000015 push eax 0x00000016 push eax 0x00000017 push edx 0x00000018 push eax 0x00000019 push edx 0x0000001a pushad 0x0000001b popad 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55F07F5 second address: 55F0811 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F450CC4A618h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55F0811 second address: 55F0838 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F450CC4AB1Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F450CC4AB25h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55F0838 second address: 55F083E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55F098B second address: 55F0991 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55F0991 second address: 55F0995 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55F0995 second address: 55F0010 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F450CC4AB23h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b retn 0004h 0x0000000e nop 0x0000000f sub esp, 04h 0x00000012 xor ebx, ebx 0x00000014 cmp eax, 00000000h 0x00000017 je 00007F450CC4AC63h 0x0000001d xor eax, eax 0x0000001f mov dword ptr [esp], 00000000h 0x00000026 mov dword ptr [esp+04h], 00000000h 0x0000002e call 00007F45115B90ABh 0x00000033 mov edi, edi 0x00000035 push eax 0x00000036 push edx 0x00000037 push eax 0x00000038 push edx 0x00000039 jmp 00007F450CC4AB1Ah 0x0000003e rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55F0010 second address: 55F0014 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55F0014 second address: 55F001A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55F001A second address: 55F00DC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F450CC4A60Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a pushad 0x0000000b mov esi, 3A891D3Dh 0x00000010 push esi 0x00000011 pushfd 0x00000012 jmp 00007F450CC4A619h 0x00000017 or si, 0206h 0x0000001c jmp 00007F450CC4A611h 0x00000021 popfd 0x00000022 pop ecx 0x00000023 popad 0x00000024 push eax 0x00000025 pushad 0x00000026 pushfd 0x00000027 jmp 00007F450CC4A60Ch 0x0000002c sub cx, 10A8h 0x00000031 jmp 00007F450CC4A60Bh 0x00000036 popfd 0x00000037 jmp 00007F450CC4A618h 0x0000003c popad 0x0000003d xchg eax, ebp 0x0000003e jmp 00007F450CC4A610h 0x00000043 mov ebp, esp 0x00000045 push eax 0x00000046 push edx 0x00000047 pushad 0x00000048 pushfd 0x00000049 jmp 00007F450CC4A60Dh 0x0000004e sub ah, 00000026h 0x00000051 jmp 00007F450CC4A611h 0x00000056 popfd 0x00000057 pushad 0x00000058 popad 0x00000059 popad 0x0000005a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55F00DC second address: 55F00E2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55F00E2 second address: 55F0134 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F450CC4A619h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push FFFFFFFEh 0x0000000d pushad 0x0000000e pushfd 0x0000000f jmp 00007F450CC4A60Ch 0x00000014 sbb cl, 00000028h 0x00000017 jmp 00007F450CC4A60Bh 0x0000001c popfd 0x0000001d mov ax, F31Fh 0x00000021 popad 0x00000022 call 00007F450CC4A609h 0x00000027 push eax 0x00000028 push edx 0x00000029 pushad 0x0000002a pushad 0x0000002b popad 0x0000002c popad 0x0000002d rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55F0134 second address: 55F0169 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007F450CC4AB1Fh 0x00000008 pop esi 0x00000009 jmp 00007F450CC4AB29h 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 push eax 0x00000012 pushad 0x00000013 push eax 0x00000014 push edx 0x00000015 mov eax, ebx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55F0169 second address: 55F016D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55F016D second address: 55F0178 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 mov bl, 02h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55F0178 second address: 55F0195 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 mov eax, dword ptr [esp+04h] 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F450CC4A60Fh 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55F0195 second address: 55F0199 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55F0199 second address: 55F019F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55F019F second address: 55F01C8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 mov eax, 5DF2F8B7h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d mov eax, dword ptr [eax] 0x0000000f jmp 00007F450CC4AB1Dh 0x00000014 mov dword ptr [esp+04h], eax 0x00000018 push eax 0x00000019 push edx 0x0000001a pushad 0x0000001b movzx esi, dx 0x0000001e mov ch, bl 0x00000020 popad 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55F01C8 second address: 55F01D8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F450CC4A60Ch 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55F01D8 second address: 55F0264 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop eax 0x00000009 jmp 00007F450CC4AB27h 0x0000000e push 56933E39h 0x00000013 jmp 00007F450CC4AB1Fh 0x00000018 xor dword ptr [esp], 233A1549h 0x0000001f jmp 00007F450CC4AB26h 0x00000024 mov eax, dword ptr fs:[00000000h] 0x0000002a pushad 0x0000002b mov al, A8h 0x0000002d mov eax, edi 0x0000002f popad 0x00000030 push ebx 0x00000031 jmp 00007F450CC4AB22h 0x00000036 mov dword ptr [esp], eax 0x00000039 push eax 0x0000003a push edx 0x0000003b jmp 00007F450CC4AB27h 0x00000040 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55F0264 second address: 55F027A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov si, bx 0x00000006 mov bx, B546h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d sub esp, 18h 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55F027A second address: 55F027E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55F027E second address: 55F0284 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55F0284 second address: 55F0342 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F450CC4AB21h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebx 0x0000000a jmp 00007F450CC4AB1Eh 0x0000000f push eax 0x00000010 jmp 00007F450CC4AB1Bh 0x00000015 xchg eax, ebx 0x00000016 pushad 0x00000017 jmp 00007F450CC4AB24h 0x0000001c jmp 00007F450CC4AB22h 0x00000021 popad 0x00000022 xchg eax, esi 0x00000023 pushad 0x00000024 pushfd 0x00000025 jmp 00007F450CC4AB1Eh 0x0000002a sub cx, 19D8h 0x0000002f jmp 00007F450CC4AB1Bh 0x00000034 popfd 0x00000035 push eax 0x00000036 pushfd 0x00000037 jmp 00007F450CC4AB1Fh 0x0000003c adc esi, 00C5DC9Eh 0x00000042 jmp 00007F450CC4AB29h 0x00000047 popfd 0x00000048 pop esi 0x00000049 popad 0x0000004a push eax 0x0000004b push eax 0x0000004c push edx 0x0000004d jmp 00007F450CC4AB1Dh 0x00000052 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55F0342 second address: 55F03E7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov dl, C6h 0x00000005 mov edi, esi 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a xchg eax, esi 0x0000000b pushad 0x0000000c mov di, cx 0x0000000f pushfd 0x00000010 jmp 00007F450CC4A60Ch 0x00000015 and eax, 18A508F8h 0x0000001b jmp 00007F450CC4A60Bh 0x00000020 popfd 0x00000021 popad 0x00000022 xchg eax, edi 0x00000023 jmp 00007F450CC4A616h 0x00000028 push eax 0x00000029 jmp 00007F450CC4A60Bh 0x0000002e xchg eax, edi 0x0000002f jmp 00007F450CC4A616h 0x00000034 mov eax, dword ptr [75AF4538h] 0x00000039 jmp 00007F450CC4A610h 0x0000003e xor dword ptr [ebp-08h], eax 0x00000041 pushad 0x00000042 pushfd 0x00000043 jmp 00007F450CC4A60Eh 0x00000048 xor cl, 00000018h 0x0000004b jmp 00007F450CC4A60Bh 0x00000050 popfd 0x00000051 push eax 0x00000052 push edx 0x00000053 movzx esi, bx 0x00000056 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55F03E7 second address: 55F041E instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007F450CC4AB1Bh 0x00000008 sbb esi, 42A78CDEh 0x0000000e jmp 00007F450CC4AB29h 0x00000013 popfd 0x00000014 pop edx 0x00000015 pop eax 0x00000016 popad 0x00000017 xor eax, ebp 0x00000019 pushad 0x0000001a pushad 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55F041E second address: 55F046F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 nop 0x00000007 jmp 00007F450CC4A60Eh 0x0000000c push eax 0x0000000d pushad 0x0000000e pushfd 0x0000000f jmp 00007F450CC4A611h 0x00000014 xor ch, 00000076h 0x00000017 jmp 00007F450CC4A611h 0x0000001c popfd 0x0000001d push eax 0x0000001e mov cx, di 0x00000021 pop edx 0x00000022 popad 0x00000023 nop 0x00000024 push eax 0x00000025 push edx 0x00000026 pushad 0x00000027 mov edi, 00C29DD6h 0x0000002c mov si, dx 0x0000002f popad 0x00000030 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55F046F second address: 55F04BE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov cl, EFh 0x00000005 mov dh, 28h 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a lea eax, dword ptr [ebp-10h] 0x0000000d pushad 0x0000000e push esi 0x0000000f pushfd 0x00000010 jmp 00007F450CC4AB1Fh 0x00000015 sbb ch, 0000000Eh 0x00000018 jmp 00007F450CC4AB29h 0x0000001d popfd 0x0000001e pop esi 0x0000001f mov ebx, 45062004h 0x00000024 popad 0x00000025 mov dword ptr fs:[00000000h], eax 0x0000002b push eax 0x0000002c push edx 0x0000002d push eax 0x0000002e push edx 0x0000002f pushad 0x00000030 popad 0x00000031 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55F04BE second address: 55F04C4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55F04C4 second address: 55F0598 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F450CC4AB1Dh 0x00000009 or cx, 91F6h 0x0000000e jmp 00007F450CC4AB21h 0x00000013 popfd 0x00000014 call 00007F450CC4AB20h 0x00000019 pop ecx 0x0000001a popad 0x0000001b pop edx 0x0000001c pop eax 0x0000001d mov dword ptr [ebp-18h], esp 0x00000020 jmp 00007F450CC4AB21h 0x00000025 mov eax, dword ptr fs:[00000018h] 0x0000002b jmp 00007F450CC4AB1Eh 0x00000030 mov ecx, dword ptr [eax+00000FDCh] 0x00000036 jmp 00007F450CC4AB20h 0x0000003b test ecx, ecx 0x0000003d pushad 0x0000003e pushfd 0x0000003f jmp 00007F450CC4AB1Eh 0x00000044 jmp 00007F450CC4AB25h 0x00000049 popfd 0x0000004a pushad 0x0000004b mov di, ax 0x0000004e mov ah, 28h 0x00000050 popad 0x00000051 popad 0x00000052 jns 00007F450CC4AB77h 0x00000058 push eax 0x00000059 push edx 0x0000005a pushad 0x0000005b pushfd 0x0000005c jmp 00007F450CC4AB1Eh 0x00000061 sbb al, 00000068h 0x00000064 jmp 00007F450CC4AB1Bh 0x00000069 popfd 0x0000006a mov edx, esi 0x0000006c popad 0x0000006d rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55F0598 second address: 55F05AC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F450CC4A610h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55F05AC second address: 55F0603 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F450CC4AB1Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b add eax, ecx 0x0000000d jmp 00007F450CC4AB26h 0x00000012 mov ecx, dword ptr [ebp+08h] 0x00000015 jmp 00007F450CC4AB20h 0x0000001a test ecx, ecx 0x0000001c push eax 0x0000001d push edx 0x0000001e jmp 00007F450CC4AB27h 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55E0010 second address: 55E00AE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F450CC4A60Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a jmp 00007F450CC4A616h 0x0000000f push eax 0x00000010 pushad 0x00000011 movsx edx, si 0x00000014 pushad 0x00000015 pushad 0x00000016 popad 0x00000017 pushfd 0x00000018 jmp 00007F450CC4A616h 0x0000001d or ecx, 2F725958h 0x00000023 jmp 00007F450CC4A60Bh 0x00000028 popfd 0x00000029 popad 0x0000002a popad 0x0000002b xchg eax, ebp 0x0000002c jmp 00007F450CC4A616h 0x00000031 mov ebp, esp 0x00000033 jmp 00007F450CC4A610h 0x00000038 sub esp, 2Ch 0x0000003b push eax 0x0000003c push edx 0x0000003d jmp 00007F450CC4A617h 0x00000042 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55E00AE second address: 55E00D2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ebx, 1DC0733Ah 0x00000008 push ebx 0x00000009 pop ecx 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push esi 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 call 00007F450CC4AB1Fh 0x00000016 pop esi 0x00000017 mov dh, 63h 0x00000019 popad 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55E0196 second address: 55E01A9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F450CC4A60Fh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55E01A9 second address: 55E01AD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55E01AD second address: 55E01C9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 test al, al 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F450CC4A610h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55E01C9 second address: 55E0216 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F450CC4AB1Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 je 00007F450CC4ACA8h 0x0000000f pushad 0x00000010 movzx eax, di 0x00000013 pushfd 0x00000014 jmp 00007F450CC4AB21h 0x00000019 sbb ecx, 51758D66h 0x0000001f jmp 00007F450CC4AB21h 0x00000024 popfd 0x00000025 popad 0x00000026 lea ecx, dword ptr [ebp-14h] 0x00000029 push eax 0x0000002a push edx 0x0000002b push eax 0x0000002c push edx 0x0000002d pushad 0x0000002e popad 0x0000002f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55E0216 second address: 55E021C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55E021C second address: 55E0245 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ax, 5687h 0x00000007 mov ecx, 222ED423h 0x0000000c popad 0x0000000d pop edx 0x0000000e pop eax 0x0000000f mov dword ptr [ebp-14h], edi 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007F450CC4AB25h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55E0274 second address: 55E0278 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55E0278 second address: 55E027C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55E027C second address: 55E0282 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55E0282 second address: 55E02C0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F450CC4AB24h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jmp 00007F450CC4AB1Bh 0x0000000f nop 0x00000010 pushad 0x00000011 jmp 00007F450CC4AB24h 0x00000016 push eax 0x00000017 push edx 0x00000018 mov ah, 2Eh 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55E02EB second address: 55E038C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F450CC4A60Fh 0x00000009 adc si, B82Eh 0x0000000e jmp 00007F450CC4A619h 0x00000013 popfd 0x00000014 popad 0x00000015 pop edx 0x00000016 pop eax 0x00000017 jg 00007F457D108772h 0x0000001d jmp 00007F450CC4A60Dh 0x00000022 js 00007F450CC4A63Dh 0x00000028 jmp 00007F450CC4A60Eh 0x0000002d cmp dword ptr [ebp-14h], edi 0x00000030 jmp 00007F450CC4A610h 0x00000035 jne 00007F457D108747h 0x0000003b jmp 00007F450CC4A610h 0x00000040 mov ebx, dword ptr [ebp+08h] 0x00000043 push eax 0x00000044 push edx 0x00000045 jmp 00007F450CC4A617h 0x0000004a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55E038C second address: 55E03C6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F450CC4AB29h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 lea eax, dword ptr [ebp-2Ch] 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f mov dh, BEh 0x00000011 jmp 00007F450CC4AB24h 0x00000016 popad 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55E03C6 second address: 55E03EB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F450CC4A60Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, esi 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F450CC4A612h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55E03EB second address: 55E048D instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007F450CC4AB22h 0x00000008 jmp 00007F450CC4AB25h 0x0000000d popfd 0x0000000e pop edx 0x0000000f pop eax 0x00000010 pushad 0x00000011 mov ax, E53Dh 0x00000015 movzx eax, dx 0x00000018 popad 0x00000019 popad 0x0000001a push eax 0x0000001b pushad 0x0000001c call 00007F450CC4AB22h 0x00000021 mov esi, 57193CE1h 0x00000026 pop esi 0x00000027 mov dl, 60h 0x00000029 popad 0x0000002a xchg eax, esi 0x0000002b pushad 0x0000002c jmp 00007F450CC4AB24h 0x00000031 pushfd 0x00000032 jmp 00007F450CC4AB22h 0x00000037 xor al, FFFFFFD8h 0x0000003a jmp 00007F450CC4AB1Bh 0x0000003f popfd 0x00000040 popad 0x00000041 nop 0x00000042 push eax 0x00000043 push edx 0x00000044 push eax 0x00000045 push edx 0x00000046 jmp 00007F450CC4AB20h 0x0000004b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55E048D second address: 55E0493 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55E0493 second address: 55E0499 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55E0499 second address: 55E049D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55E049D second address: 55E04C2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F450CC4AB28h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55E04C2 second address: 55E04C8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55E04C8 second address: 55E0518 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F450CC4AB25h 0x00000009 xor ecx, 50100636h 0x0000000f jmp 00007F450CC4AB21h 0x00000014 popfd 0x00000015 mov bx, cx 0x00000018 popad 0x00000019 pop edx 0x0000001a pop eax 0x0000001b nop 0x0000001c push eax 0x0000001d push edx 0x0000001e push eax 0x0000001f push edx 0x00000020 jmp 00007F450CC4AB24h 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55E0518 second address: 55E051E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55E051E second address: 55E052F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F450CC4AB1Dh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55E052F second address: 55E054B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ebx 0x00000009 jmp 00007F450CC4A60Ah 0x0000000e mov dword ptr [esp], ebx 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 pushad 0x00000016 popad 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55E054B second address: 55E054F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55E054F second address: 55E0555 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55D0DD5 second address: 55D0E84 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F450CC4AB1Fh 0x00000008 mov dx, ax 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e xchg eax, ebp 0x0000000f pushad 0x00000010 jmp 00007F450CC4AB20h 0x00000015 call 00007F450CC4AB22h 0x0000001a call 00007F450CC4AB22h 0x0000001f pop ecx 0x00000020 pop edi 0x00000021 popad 0x00000022 push eax 0x00000023 jmp 00007F450CC4AB21h 0x00000028 xchg eax, ebp 0x00000029 pushad 0x0000002a jmp 00007F450CC4AB1Ch 0x0000002f pushfd 0x00000030 jmp 00007F450CC4AB22h 0x00000035 or cx, 4328h 0x0000003a jmp 00007F450CC4AB1Bh 0x0000003f popfd 0x00000040 popad 0x00000041 mov ebp, esp 0x00000043 push eax 0x00000044 push edx 0x00000045 jmp 00007F450CC4AB25h 0x0000004a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55E0A31 second address: 55E0A67 instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007F450CC4A60Bh 0x00000008 and ax, 0ADEh 0x0000000d jmp 00007F450CC4A619h 0x00000012 popfd 0x00000013 pop edx 0x00000014 pop eax 0x00000015 popad 0x00000016 push eax 0x00000017 push eax 0x00000018 push edx 0x00000019 pushad 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55E0A67 second address: 55E0A6D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55E0A6D second address: 55E0A72 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55E0A72 second address: 55E0AAB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov esi, edi 0x00000005 pushfd 0x00000006 jmp 00007F450CC4AB21h 0x0000000b xor ecx, 3ECC03C6h 0x00000011 jmp 00007F450CC4AB21h 0x00000016 popfd 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a xchg eax, ebp 0x0000001b push eax 0x0000001c push edx 0x0000001d push eax 0x0000001e push edx 0x0000001f push eax 0x00000020 push edx 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55E0AAB second address: 55E0AAF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55E0AAF second address: 55E0AC2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F450CC4AB1Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55E0AC2 second address: 55E0ADA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F450CC4A614h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55E0ADA second address: 55E0B5C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F450CC4AB1Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov ebp, esp 0x0000000d pushad 0x0000000e pushad 0x0000000f mov edx, ecx 0x00000011 pushfd 0x00000012 jmp 00007F450CC4AB1Eh 0x00000017 xor si, 8128h 0x0000001c jmp 00007F450CC4AB1Bh 0x00000021 popfd 0x00000022 popad 0x00000023 call 00007F450CC4AB28h 0x00000028 mov edx, esi 0x0000002a pop ecx 0x0000002b popad 0x0000002c cmp dword ptr [75AF459Ch], 05h 0x00000033 jmp 00007F450CC4AB1Dh 0x00000038 je 00007F457D0F89D3h 0x0000003e pushad 0x0000003f call 00007F450CC4AB1Ch 0x00000044 mov bx, ax 0x00000047 pop ecx 0x00000048 pushad 0x00000049 push eax 0x0000004a push edx 0x0000004b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55E0B5C second address: 55E0B93 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 pop ebp 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a pushfd 0x0000000b jmp 00007F450CC4A611h 0x00000010 xor eax, 3FD3EC06h 0x00000016 jmp 00007F450CC4A611h 0x0000001b popfd 0x0000001c mov ch, ABh 0x0000001e popad 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55E0BF6 second address: 55E0C83 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F450CC4AB27h 0x00000009 add eax, 29243AAEh 0x0000000f jmp 00007F450CC4AB29h 0x00000014 popfd 0x00000015 pushfd 0x00000016 jmp 00007F450CC4AB20h 0x0000001b add cx, 5428h 0x00000020 jmp 00007F450CC4AB1Bh 0x00000025 popfd 0x00000026 popad 0x00000027 pop edx 0x00000028 pop eax 0x00000029 mov eax, dword ptr [esp+04h] 0x0000002d jmp 00007F450CC4AB29h 0x00000032 mov eax, dword ptr [eax] 0x00000034 push eax 0x00000035 push edx 0x00000036 jmp 00007F450CC4AB1Ch 0x0000003b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55E0D12 second address: 55E0D16 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55E0D16 second address: 55E0D1A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55E0D1A second address: 55E0D20 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55E0D74 second address: 55E0D78 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55F09B9 second address: 55F09BD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55F09BD second address: 55F09C3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55F09C3 second address: 55F09C9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55F09C9 second address: 55F09CD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55F09CD second address: 55F09D1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55F09D1 second address: 55F0A42 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ebp 0x00000009 jmp 00007F450CC4AB20h 0x0000000e push eax 0x0000000f pushad 0x00000010 call 00007F450CC4AB21h 0x00000015 jmp 00007F450CC4AB20h 0x0000001a pop esi 0x0000001b pushfd 0x0000001c jmp 00007F450CC4AB1Bh 0x00000021 xor esi, 3ECFC08Eh 0x00000027 jmp 00007F450CC4AB29h 0x0000002c popfd 0x0000002d popad 0x0000002e xchg eax, ebp 0x0000002f push eax 0x00000030 push edx 0x00000031 push eax 0x00000032 push edx 0x00000033 pushad 0x00000034 popad 0x00000035 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55F0A42 second address: 55F0A55 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F450CC4A60Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55F0A55 second address: 55F0A9A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F450CC4AB29h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b jmp 00007F450CC4AB1Eh 0x00000010 xchg eax, esi 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 call 00007F450CC4AB1Dh 0x00000019 pop eax 0x0000001a mov ebx, 0F64E074h 0x0000001f popad 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55F0A9A second address: 55F0AB9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F450CC4A60Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jmp 00007F450CC4A60Bh 0x0000000f xchg eax, esi 0x00000010 pushad 0x00000011 pushad 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55F0AB9 second address: 55F0B0E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop edi 0x00000006 popad 0x00000007 mov di, si 0x0000000a popad 0x0000000b mov esi, dword ptr [ebp+0Ch] 0x0000000e jmp 00007F450CC4AB26h 0x00000013 test esi, esi 0x00000015 jmp 00007F450CC4AB20h 0x0000001a je 00007F457D0E83DEh 0x00000020 push eax 0x00000021 push edx 0x00000022 jmp 00007F450CC4AB27h 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55F0B0E second address: 55F0B41 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F450CC4A619h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 cmp dword ptr [75AF459Ch], 05h 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007F450CC4A60Dh 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55F0B41 second address: 55F0B9E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F450CC4AB21h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 je 00007F457D100457h 0x0000000f pushad 0x00000010 pushfd 0x00000011 jmp 00007F450CC4AB23h 0x00000016 jmp 00007F450CC4AB23h 0x0000001b popfd 0x0000001c popad 0x0000001d xchg eax, esi 0x0000001e push eax 0x0000001f push edx 0x00000020 jmp 00007F450CC4AB25h 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55F0B9E second address: 55F0BBB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ebx 0x00000004 pop eax 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F450CC4A612h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55F0BBB second address: 55F0BC1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55F0BC1 second address: 55F0BC5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 55F0BC5 second address: 55F0BE4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, esi 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F450CC4AB24h 0x00000010 rdtsc |