Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B387F0 |
0_2_00B387F0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B3A960 |
0_2_00B3A960 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B66F90 |
0_2_00B66F90 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C700C6 |
0_2_00C700C6 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B580B0 |
0_2_00B580B0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BD80B2 |
0_2_00BD80B2 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C3C0D7 |
0_2_00C3C0D7 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BE4088 |
0_2_00BE4088 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C1C0F7 |
0_2_00C1C0F7 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B9C081 |
0_2_00B9C081 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BBC082 |
0_2_00BBC082 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C6C0FD |
0_2_00C6C0FD |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C280FE |
0_2_00C280FE |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BC00E4 |
0_2_00BC00E4 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C500A2 |
0_2_00C500A2 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BFC0D6 |
0_2_00BFC0D6 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BAA0D6 |
0_2_00BAA0D6 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B680D9 |
0_2_00B680D9 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BF20D0 |
0_2_00BF20D0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C7E044 |
0_2_00C7E044 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B6A030 |
0_2_00B6A030 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C90040 |
0_2_00C90040 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BD202C |
0_2_00BD202C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C5E058 |
0_2_00C5E058 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BEC077 |
0_2_00BEC077 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BB0070 |
0_2_00BB0070 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B55F7D |
0_2_00B55F7D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C12017 |
0_2_00C12017 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BF0067 |
0_2_00BF0067 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B3E06A |
0_2_00B3E06A |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C74020 |
0_2_00C74020 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C3E028 |
0_2_00C3E028 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C2A036 |
0_2_00C2A036 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C98036 |
0_2_00C98036 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CAA1CC |
0_2_00CAA1CC |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BAC19D |
0_2_00BAC19D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B381F0 |
0_2_00B381F0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BA81F2 |
0_2_00BA81F2 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CA0186 |
0_2_00CA0186 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C48198 |
0_2_00C48198 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C961A9 |
0_2_00C961A9 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B601D0 |
0_2_00B601D0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BC21C9 |
0_2_00BC21C9 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C261B8 |
0_2_00C261B8 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C80143 |
0_2_00C80143 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BEE12A |
0_2_00BEE12A |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C66153 |
0_2_00C66153 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C7A16B |
0_2_00C7A16B |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B5A100 |
0_2_00B5A100 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C9A17F |
0_2_00C9A17F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C7817C |
0_2_00C7817C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C1A17F |
0_2_00C1A17F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C3417C |
0_2_00C3417C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B56170 |
0_2_00B56170 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C08109 |
0_2_00C08109 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BDC15E |
0_2_00BDC15E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C52126 |
0_2_00C52126 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C7612B |
0_2_00C7612B |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B9E140 |
0_2_00B9E140 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C0E139 |
0_2_00C0E139 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C002C8 |
0_2_00C002C8 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C202CC |
0_2_00C202CC |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C862DD |
0_2_00C862DD |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B3E2A9 |
0_2_00B3E2A9 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BE228E |
0_2_00BE228E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C162F3 |
0_2_00C162F3 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C102FD |
0_2_00C102FD |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C502FB |
0_2_00C502FB |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BF42FA |
0_2_00BF42FA |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BE62E7 |
0_2_00BE62E7 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C542A7 |
0_2_00C542A7 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BE82D7 |
0_2_00BE82D7 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B982CB |
0_2_00B982CB |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B6E2C0 |
0_2_00B6E2C0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BFA233 |
0_2_00BFA233 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B9A219 |
0_2_00B9A219 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B36200 |
0_2_00B36200 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C24275 |
0_2_00C24275 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B34270 |
0_2_00B34270 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B52270 |
0_2_00B52270 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BCC274 |
0_2_00BCC274 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C9E21F |
0_2_00C9E21F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C4222E |
0_2_00C4222E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C02230 |
0_2_00C02230 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BA6246 |
0_2_00BA6246 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C363C2 |
0_2_00C363C2 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C183CD |
0_2_00C183CD |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C443D5 |
0_2_00C443D5 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C6E3D1 |
0_2_00C6E3D1 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CE03D5 |
0_2_00CE03D5 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C4C3E5 |
0_2_00C4C3E5 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BF0399 |
0_2_00BF0399 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BEE38C |
0_2_00BEE38C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C843FB |
0_2_00C843FB |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C943FE |
0_2_00C943FE |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C303FF |
0_2_00C303FF |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B6A3F0 |
0_2_00B6A3F0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C4E38C |
0_2_00C4E38C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BB63F6 |
0_2_00BB63F6 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CA239E |
0_2_00CA239E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BBC3E5 |
0_2_00BBC3E5 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C2E3A7 |
0_2_00C2E3A7 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C3A3AA |
0_2_00C3A3AA |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BCC3CC |
0_2_00BCC3CC |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B9C338 |
0_2_00B9C338 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BB8338 |
0_2_00BB8338 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C72343 |
0_2_00C72343 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BDC338 |
0_2_00BDC338 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C8E36F |
0_2_00C8E36F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C3C36D |
0_2_00C3C36D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C8C319 |
0_2_00C8C319 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B4C360 |
0_2_00B4C360 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BB435F |
0_2_00BB435F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C96331 |
0_2_00C96331 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C884C5 |
0_2_00C884C5 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C244EB |
0_2_00C244EB |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B9C481 |
0_2_00B9C481 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BF24F2 |
0_2_00BF24F2 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C1C495 |
0_2_00C1C495 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BAA4D1 |
0_2_00BAA4D1 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C904A4 |
0_2_00C904A4 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C7C4A8 |
0_2_00C7C4A8 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C3E4B4 |
0_2_00C3E4B4 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B964C4 |
0_2_00B964C4 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C0A441 |
0_2_00C0A441 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B9243A |
0_2_00B9243A |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B66430 |
0_2_00B66430 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C3245B |
0_2_00C3245B |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C7E458 |
0_2_00C7E458 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BD040E |
0_2_00BD040E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B94407 |
0_2_00B94407 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C1441C |
0_2_00C1441C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C5041B |
0_2_00C5041B |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BCE456 |
0_2_00BCE456 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C48435 |
0_2_00C48435 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C1243D |
0_2_00C1243D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C105C8 |
0_2_00C105C8 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C665CA |
0_2_00C665CA |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C7E5CA |
0_2_00C7E5CA |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C2A5EB |
0_2_00C2A5EB |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BEA592 |
0_2_00BEA592 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B9E596 |
0_2_00B9E596 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BBE588 |
0_2_00BBE588 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C70581 |
0_2_00C70581 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BFA5E5 |
0_2_00BFA5E5 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C0C5B2 |
0_2_00C0C5B2 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C4C540 |
0_2_00C4C540 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C9855E |
0_2_00C9855E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BB0513 |
0_2_00BB0513 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BFC514 |
0_2_00BFC514 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C5056E |
0_2_00C5056E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BD8579 |
0_2_00BD8579 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B46571 |
0_2_00B46571 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BC2577 |
0_2_00BC2577 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C9A502 |
0_2_00C9A502 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C066D0 |
0_2_00C066D0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BA86AC |
0_2_00BA86AC |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CEA6EE |
0_2_00CEA6EE |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B36690 |
0_2_00B36690 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BB869F |
0_2_00BB869F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B66690 |
0_2_00B66690 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B6E690 |
0_2_00B6E690 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C726EB |
0_2_00C726EB |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B566E7 |
0_2_00B566E7 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B5C6D7 |
0_2_00B5C6D7 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C766AB |
0_2_00C766AB |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C206BE |
0_2_00C206BE |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BFC6C1 |
0_2_00BFC6C1 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C64641 |
0_2_00C64641 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C36650 |
0_2_00C36650 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BC4628 |
0_2_00BC4628 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C3C65D |
0_2_00C3C65D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C8C66F |
0_2_00C8C66F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C74670 |
0_2_00C74670 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BA4603 |
0_2_00BA4603 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B42670 |
0_2_00B42670 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BFE671 |
0_2_00BFE671 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C5460A |
0_2_00C5460A |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C0461D |
0_2_00C0461D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C2461C |
0_2_00C2461C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BDE646 |
0_2_00BDE646 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BF67B7 |
0_2_00BF67B7 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B927B5 |
0_2_00B927B5 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C927C6 |
0_2_00C927C6 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B467A5 |
0_2_00B467A5 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C147E7 |
0_2_00C147E7 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C4E7EE |
0_2_00C4E7EE |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C027ED |
0_2_00C027ED |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C587F5 |
0_2_00C587F5 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C567FD |
0_2_00C567FD |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C967F1 |
0_2_00C967F1 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C5A7F8 |
0_2_00C5A7F8 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C0E781 |
0_2_00C0E781 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BE27F7 |
0_2_00BE27F7 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C3E78C |
0_2_00C3E78C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C1E793 |
0_2_00C1E793 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BDC7DE |
0_2_00BDC7DE |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BB47DF |
0_2_00BB47DF |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B967C9 |
0_2_00B967C9 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C367B0 |
0_2_00C367B0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C8E7BE |
0_2_00C8E7BE |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C18741 |
0_2_00C18741 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C9874D |
0_2_00C9874D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B48731 |
0_2_00B48731 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C78757 |
0_2_00C78757 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B50717 |
0_2_00B50717 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B9870A |
0_2_00B9870A |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BBA705 |
0_2_00BBA705 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BCE77B |
0_2_00BCE77B |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BC8754 |
0_2_00BC8754 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BDA755 |
0_2_00BDA755 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C2C73D |
0_2_00C2C73D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C948CF |
0_2_00C948CF |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BA48B5 |
0_2_00BA48B5 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BAA899 |
0_2_00BAA899 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C048E9 |
0_2_00C048E9 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C4C8FF |
0_2_00C4C8FF |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BC28F7 |
0_2_00BC28F7 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BCA8F1 |
0_2_00BCA8F1 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BAC838 |
0_2_00BAC838 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C6E844 |
0_2_00C6E844 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C8A840 |
0_2_00C8A840 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BB6831 |
0_2_00BB6831 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B9082D |
0_2_00B9082D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C8885F |
0_2_00C8885F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C62866 |
0_2_00C62866 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C40866 |
0_2_00C40866 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BEC81D |
0_2_00BEC81D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BCC80D |
0_2_00BCC80D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C16800 |
0_2_00C16800 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C4681A |
0_2_00C4681A |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CE8826 |
0_2_00CE8826 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B9C841 |
0_2_00B9C841 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BE49BA |
0_2_00BE49BA |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C209CE |
0_2_00C209CE |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C349D1 |
0_2_00C349D1 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BFA9A2 |
0_2_00BFA9A2 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C849D6 |
0_2_00C849D6 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B38990 |
0_2_00B38990 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BC498A |
0_2_00BC498A |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BCC985 |
0_2_00BCC985 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C58980 |
0_2_00C58980 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C10988 |
0_2_00C10988 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C4A9AA |
0_2_00C4A9AA |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C389B0 |
0_2_00C389B0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C9A94E |
0_2_00C9A94E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C90958 |
0_2_00C90958 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C3C95C |
0_2_00C3C95C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C54972 |
0_2_00C54972 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CE2977 |
0_2_00CE2977 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C6A901 |
0_2_00C6A901 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BB2972 |
0_2_00BB2972 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B5297F |
0_2_00B5297F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BC0973 |
0_2_00BC0973 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C6091C |
0_2_00C6091C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BAC964 |
0_2_00BAC964 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C0A921 |
0_2_00C0A921 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BD095F |
0_2_00BD095F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BE6958 |
0_2_00BE6958 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C8E932 |
0_2_00C8E932 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BB4944 |
0_2_00BB4944 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BDEAB7 |
0_2_00BDEAB7 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C46ACF |
0_2_00C46ACF |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B98AB4 |
0_2_00B98AB4 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BF0AAF |
0_2_00BF0AAF |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C54AD4 |
0_2_00C54AD4 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BCEA99 |
0_2_00BCEA99 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C00AF0 |
0_2_00C00AF0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C7EAF7 |
0_2_00C7EAF7 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BBAA88 |
0_2_00BBAA88 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C74A90 |
0_2_00C74A90 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C2AAA2 |
0_2_00C2AAA2 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C5EAAF |
0_2_00C5EAAF |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BA8AD1 |
0_2_00BA8AD1 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B6CAC0 |
0_2_00B6CAC0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BF4AC4 |
0_2_00BF4AC4 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BD8A3D |
0_2_00BD8A3D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C0CA47 |
0_2_00C0CA47 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C70A49 |
0_2_00C70A49 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BBEA29 |
0_2_00BBEA29 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C2EA56 |
0_2_00C2EA56 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BA6A2F |
0_2_00BA6A2F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C26A55 |
0_2_00C26A55 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C28A65 |
0_2_00C28A65 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BDAA01 |
0_2_00BDAA01 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C7AA7B |
0_2_00C7AA7B |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CF2A09 |
0_2_00CF2A09 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C92A17 |
0_2_00C92A17 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C6CA25 |
0_2_00C6CA25 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B3CA54 |
0_2_00B3CA54 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C9EA23 |
0_2_00C9EA23 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C8CA39 |
0_2_00C8CA39 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B44A40 |
0_2_00B44A40 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BEAA46 |
0_2_00BEAA46 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C80A34 |
0_2_00C80A34 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C86BCE |
0_2_00C86BCE |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C36BC4 |
0_2_00C36BC4 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B34BA0 |
0_2_00B34BA0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BA2BAE |
0_2_00BA2BAE |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BCABA6 |
0_2_00BCABA6 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B94BA7 |
0_2_00B94BA7 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C62BE4 |
0_2_00C62BE4 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C42BEF |
0_2_00C42BEF |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C26BF3 |
0_2_00C26BF3 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BE2BF3 |
0_2_00BE2BF3 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C04B8D |
0_2_00C04B8D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C56B8B |
0_2_00C56B8B |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C2EB93 |
0_2_00C2EB93 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C24B9F |
0_2_00C24B9F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C48BA4 |
0_2_00C48BA4 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C1CBAD |
0_2_00C1CBAD |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BE4BD3 |
0_2_00BE4BD3 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C94BBB |
0_2_00C94BBB |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C40BBD |
0_2_00C40BBD |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C18BBB |
0_2_00C18BBB |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B9ABC7 |
0_2_00B9ABC7 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BF8B37 |
0_2_00BF8B37 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BFCB27 |
0_2_00BFCB27 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BECB0D |
0_2_00BECB0D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B46B7E |
0_2_00B46B7E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B9EB74 |
0_2_00B9EB74 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C76B2C |
0_2_00C76B2C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BD4B51 |
0_2_00BD4B51 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B4CB5A |
0_2_00B4CB5A |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BB6B4B |
0_2_00BB6B4B |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C2CB33 |
0_2_00C2CB33 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C08B3C |
0_2_00C08B3C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C14CC9 |
0_2_00C14CC9 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C32CC8 |
0_2_00C32CC8 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BA6CF9 |
0_2_00BA6CF9 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C02C8A |
0_2_00C02C8A |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C16C8D |
0_2_00C16C8D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B52CF8 |
0_2_00B52CF8 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B6CCE0 |
0_2_00B6CCE0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C80CAA |
0_2_00C80CAA |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C0AC58 |
0_2_00C0AC58 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C50C5F |
0_2_00C50C5F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B48C1E |
0_2_00B48C1E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BC0C7C |
0_2_00BC0C7C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BAAC7B |
0_2_00BAAC7B |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C72C16 |
0_2_00C72C16 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C8AC16 |
0_2_00C8AC16 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CA0C29 |
0_2_00CA0C29 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C9CC26 |
0_2_00C9CC26 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BCEC4F |
0_2_00BCEC4F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C82C3C |
0_2_00C82C3C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C96C3D |
0_2_00C96C3D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B66C40 |
0_2_00B66C40 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B64C4D |
0_2_00B64C4D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C46DE7 |
0_2_00C46DE7 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BB2DFC |
0_2_00BB2DFC |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BDADE0 |
0_2_00BDADE0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C62D55 |
0_2_00C62D55 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C8AD5C |
0_2_00C8AD5C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C6CD50 |
0_2_00C6CD50 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BD8D21 |
0_2_00BD8D21 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CCAD63 |
0_2_00CCAD63 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C0ED6F |
0_2_00C0ED6F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BE4D0D |
0_2_00BE4D0D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C66D72 |
0_2_00C66D72 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C44D7E |
0_2_00C44D7E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BFAD03 |
0_2_00BFAD03 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C1CD7C |
0_2_00C1CD7C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C3CD07 |
0_2_00C3CD07 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C4AD01 |
0_2_00C4AD01 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BCAD77 |
0_2_00BCAD77 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B6CD60 |
0_2_00B6CD60 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C6ED1A |
0_2_00C6ED1A |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B98D55 |
0_2_00B98D55 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C4CD28 |
0_2_00C4CD28 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BACD54 |
0_2_00BACD54 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BB4D42 |
0_2_00BB4D42 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BF2D46 |
0_2_00BF2D46 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BFCD42 |
0_2_00BFCD42 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BC6EB7 |
0_2_00BC6EB7 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B56EBE |
0_2_00B56EBE |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C0CED2 |
0_2_00C0CED2 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B32EA0 |
0_2_00B32EA0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C94ED1 |
0_2_00C94ED1 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C34EDE |
0_2_00C34EDE |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BD4EA2 |
0_2_00BD4EA2 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B46E97 |
0_2_00B46E97 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C2EEE5 |
0_2_00C2EEE5 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BB6E84 |
0_2_00BB6E84 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BF2EEF |
0_2_00BF2EEF |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C98E98 |
0_2_00C98E98 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B98EED |
0_2_00B98EED |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C4AE9A |
0_2_00C4AE9A |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C20EA4 |
0_2_00C20EA4 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B9CE3D |
0_2_00B9CE3D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C64E60 |
0_2_00C64E60 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C2AE68 |
0_2_00C2AE68 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B4AE00 |
0_2_00B4AE00 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B6CE00 |
0_2_00B6CE00 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BA6E7B |
0_2_00BA6E7B |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C5EE09 |
0_2_00C5EE09 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C84E23 |
0_2_00C84E23 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C70E33 |
0_2_00C70E33 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C1EFC0 |
0_2_00C1EFC0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B48FAD |
0_2_00B48FAD |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BD6FA0 |
0_2_00BD6FA0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C00FE4 |
0_2_00C00FE4 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C9EFF4 |
0_2_00C9EFF4 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B94FE8 |
0_2_00B94FE8 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C68F93 |
0_2_00C68F93 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C86F9E |
0_2_00C86F9E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B40FD6 |
0_2_00B40FD6 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C32F42 |
0_2_00C32F42 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B4EF30 |
0_2_00B4EF30 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B90F31 |
0_2_00B90F31 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BA2F31 |
0_2_00BA2F31 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BE8F28 |
0_2_00BE8F28 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BA4F27 |
0_2_00BA4F27 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BDEF15 |
0_2_00BDEF15 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C74F6C |
0_2_00C74F6C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C60F69 |
0_2_00C60F69 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C2CF73 |
0_2_00C2CF73 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CF0F75 |
0_2_00CF0F75 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B44F08 |
0_2_00B44F08 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C06F1A |
0_2_00C06F1A |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C04F27 |
0_2_00C04F27 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B58F5D |
0_2_00B58F5D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C10F29 |
0_2_00C10F29 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C92F25 |
0_2_00C92F25 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BFEF43 |
0_2_00BFEF43 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BDD0B3 |
0_2_00BDD0B3 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C410D2 |
0_2_00C410D2 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BC10A7 |
0_2_00BC10A7 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BB10A5 |
0_2_00BB10A5 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C450ED |
0_2_00C450ED |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C890E6 |
0_2_00C890E6 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B5D085 |
0_2_00B5D085 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C6B0F6 |
0_2_00C6B0F6 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BEB08A |
0_2_00BEB08A |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C9D08E |
0_2_00C9D08E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C7D08E |
0_2_00C7D08E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C05090 |
0_2_00C05090 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BE50D4 |
0_2_00BE50D4 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C5B0AA |
0_2_00C5B0AA |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BC30CA |
0_2_00BC30CA |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C5D0BF |
0_2_00C5D0BF |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C090BF |
0_2_00C090BF |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C65040 |
0_2_00C65040 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BB7031 |
0_2_00BB7031 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BE3032 |
0_2_00BE3032 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B9701D |
0_2_00B9701D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C3D06E |
0_2_00C3D06E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BAF078 |
0_2_00BAF078 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B39070 |
0_2_00B39070 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C4301D |
0_2_00C4301D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C0B01C |
0_2_00C0B01C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BAB067 |
0_2_00BAB067 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C57035 |
0_2_00C57035 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C2703C |
0_2_00C2703C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BC91B0 |
0_2_00BC91B0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C511D5 |
0_2_00C511D5 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C7B1D1 |
0_2_00C7B1D1 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C291D9 |
0_2_00C291D9 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C471E7 |
0_2_00C471E7 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B47190 |
0_2_00B47190 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BA7195 |
0_2_00BA7195 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BEF1FC |
0_2_00BEF1FC |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C8D18A |
0_2_00C8D18A |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C2F187 |
0_2_00C2F187 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C5F18F |
0_2_00C5F18F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C991AD |
0_2_00C991AD |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BE11D8 |
0_2_00BE11D8 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BFF1D8 |
0_2_00BFF1D8 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BDD1CC |
0_2_00BDD1CC |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C831BB |
0_2_00C831BB |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BCB1C2 |
0_2_00BCB1C2 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C33155 |
0_2_00C33155 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C0F100 |
0_2_00C0F100 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C6711E |
0_2_00C6711E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B9D163 |
0_2_00B9D163 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BB9148 |
0_2_00BB9148 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C49132 |
0_2_00C49132 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C81131 |
0_2_00C81131 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C772C6 |
0_2_00C772C6 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B492BA |
0_2_00B492BA |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C3F2D4 |
0_2_00C3F2D4 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B9B29E |
0_2_00B9B29E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BF528D |
0_2_00BF528D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B932F8 |
0_2_00B932F8 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D65293 |
0_2_00D65293 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BB32F6 |
0_2_00BB32F6 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BA52F4 |
0_2_00BA52F4 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C0D295 |
0_2_00C0D295 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00B592D0 |
0_2_00B592D0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C792B7 |
0_2_00C792B7 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C3D248 |
0_2_00C3D248 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C1524F |
0_2_00C1524F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BBB229 |
0_2_00BBB229 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C1D25E |
0_2_00C1D25E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00CA126B |
0_2_00CA126B |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C39274 |
0_2_00C39274 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BB5203 |
0_2_00BB5203 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C3527C |
0_2_00C3527C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00C6321D |
0_2_00C6321D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BA9242 |
0_2_00BA9242 |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: CFD9D9 second address: CFDA05 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0C10EAEB49h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c jp 00007F0C10EAEB36h 0x00000012 jo 00007F0C10EAEB36h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: CFDA05 second address: CFDA09 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: CFDA09 second address: CFDA1F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007F0C10EAEB3Ah 0x0000000f push eax 0x00000010 pop eax 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: CF40DF second address: CF40E3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: CFD13B second address: CFD146 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 push esi 0x00000008 pop esi 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: CFD146 second address: CFD165 instructions: 0x00000000 rdtsc 0x00000002 jng 00007F0C10DA4036h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edi 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e push edi 0x0000000f pop edi 0x00000010 jmp 00007F0C10DA403Fh 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: CFD165 second address: CFD16B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: CFD16B second address: CFD174 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: CFD174 second address: CFD191 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0C10EAEB47h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: CFD191 second address: CFD1A4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jo 00007F0C10DA4036h 0x0000000d jc 00007F0C10DA4036h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: CFFA2A second address: CFFA37 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pop ecx 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: CFFA37 second address: CFFA41 instructions: 0x00000000 rdtsc 0x00000002 jc 00007F0C10DA4036h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: CFFA41 second address: CFFA8A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0C10EAEB3Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a push 00000000h 0x0000000c push ebx 0x0000000d call 00007F0C10EAEB38h 0x00000012 pop ebx 0x00000013 mov dword ptr [esp+04h], ebx 0x00000017 add dword ptr [esp+04h], 00000014h 0x0000001f inc ebx 0x00000020 push ebx 0x00000021 ret 0x00000022 pop ebx 0x00000023 ret 0x00000024 push 00000000h 0x00000026 jmp 00007F0C10EAEB3Dh 0x0000002b push CEF6D891h 0x00000030 push eax 0x00000031 push edx 0x00000032 jl 00007F0C10EAEB3Ch 0x00000038 push eax 0x00000039 push edx 0x0000003a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: CFFA8A second address: CFFA8E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: CFFBD7 second address: CFFBF3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0C10EAEB48h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: CFFBF3 second address: CFFC24 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0C10DA4046h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov eax, dword ptr [esp+04h] 0x0000000f push esi 0x00000010 push ebx 0x00000011 push ebx 0x00000012 pop ebx 0x00000013 pop ebx 0x00000014 pop esi 0x00000015 mov eax, dword ptr [eax] 0x00000017 jc 00007F0C10DA403Eh 0x0000001d push eax 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: CFFD7C second address: CFFD80 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D20A82 second address: D20AA2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0C10DA4044h 0x00000009 pop esi 0x0000000a pushad 0x0000000b pushad 0x0000000c popad 0x0000000d push ebx 0x0000000e pop ebx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D20AA2 second address: D20AAD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnl 00007F0C10EAEB36h 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: CE199D second address: CE19A1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D1EE71 second address: D1EE75 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D1EE75 second address: D1EE93 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F0C10DA4044h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D1EE93 second address: D1EE97 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D1EE97 second address: D1EE9B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D1EFC5 second address: D1EFD8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pushad 0x00000006 jmp 00007F0C10EAEB3Bh 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D1F140 second address: D1F15E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pop ecx 0x00000008 pushad 0x00000009 push edx 0x0000000a jmp 00007F0C10DA403Dh 0x0000000f pop edx 0x00000010 push eax 0x00000011 push edx 0x00000012 push edi 0x00000013 pop edi 0x00000014 push ecx 0x00000015 pop ecx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D1F15E second address: D1F17B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0C10EAEB44h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a pushad 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D1F17B second address: D1F181 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D1F709 second address: D1F70D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: CEEE9C second address: CEEEA0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: CEEEA0 second address: CEEEAB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: CEEEAB second address: CEEEBE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 pop esi 0x0000000a push eax 0x0000000b push edx 0x0000000c push edx 0x0000000d push edi 0x0000000e pop edi 0x0000000f pop edx 0x00000010 push ecx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: CEEEBE second address: CEEEC4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: CEEEC4 second address: CEEEC9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D1FAAF second address: D1FAB7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D1FAB7 second address: D1FABB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D1FABB second address: D1FADB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F0C10EAEB44h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push ebx 0x0000000e pop ebx 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D1FADB second address: D1FB07 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F0C10DA4049h 0x00000012 je 00007F0C10DA4036h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D2027A second address: D2027E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D2027E second address: D20284 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D20284 second address: D2028B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D20582 second address: D205D0 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pushad 0x00000004 popad 0x00000005 jmp 00007F0C10DA4045h 0x0000000a pop edi 0x0000000b push ebx 0x0000000c jmp 00007F0C10DA4048h 0x00000011 pop ebx 0x00000012 pop edx 0x00000013 pop eax 0x00000014 push esi 0x00000015 pushad 0x00000016 push edi 0x00000017 pop edi 0x00000018 jmp 00007F0C10DA4041h 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D255EC second address: D2561F instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 jmp 00007F0C10EAEB3Ch 0x00000008 pop edi 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jnc 00007F0C10EAEB4Eh 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D2561F second address: D25625 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D25625 second address: D25629 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D25BCF second address: D25BEA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0C10DA4047h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D24532 second address: D24543 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0C10EAEB3Dh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D25CBC second address: D25CC2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D25CC2 second address: D25D23 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push eax 0x00000007 jmp 00007F0C10EAEB3Ah 0x0000000c mov eax, dword ptr [esp+04h] 0x00000010 pushad 0x00000011 jmp 00007F0C10EAEB49h 0x00000016 jno 00007F0C10EAEB38h 0x0000001c popad 0x0000001d mov eax, dword ptr [eax] 0x0000001f jns 00007F0C10EAEB49h 0x00000025 mov dword ptr [esp+04h], eax 0x00000029 js 00007F0C10EAEB44h 0x0000002f push eax 0x00000030 push edx 0x00000031 push eax 0x00000032 push edx 0x00000033 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D25D23 second address: D25D27 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D277D7 second address: D277DC instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: CDFED4 second address: CDFED8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: CDFED8 second address: CDFEDE instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D2AE3C second address: D2AE67 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0C10DA4049h 0x00000007 je 00007F0C10DA4036h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f jbe 00007F0C10DA403Eh 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D2AE67 second address: D2AE6D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D2AE6D second address: D2AEA3 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 jmp 00007F0C10DA403Fh 0x00000008 jmp 00007F0C10DA4042h 0x0000000d pop edx 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007F0C10DA403Fh 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D2AEA3 second address: D2AEA7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D2AEA7 second address: D2AEC5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d jmp 00007F0C10DA4041h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D2E29E second address: D2E2C7 instructions: 0x00000000 rdtsc 0x00000002 js 00007F0C10EAEB36h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b jmp 00007F0C10EAEB3Dh 0x00000010 jo 00007F0C10EAEB36h 0x00000016 popad 0x00000017 popad 0x00000018 push eax 0x00000019 push eax 0x0000001a push edx 0x0000001b pushad 0x0000001c push edi 0x0000001d pop edi 0x0000001e push esi 0x0000001f pop esi 0x00000020 popad 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D2E495 second address: D2E49F instructions: 0x00000000 rdtsc 0x00000002 js 00007F0C10DA4036h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D2EC9B second address: D2EC9F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D2EC9F second address: D2ECA5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D2ED41 second address: D2ED47 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D2ED47 second address: D2ED78 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], ebx 0x0000000b push 00000000h 0x0000000d push edx 0x0000000e call 00007F0C10DA4038h 0x00000013 pop edx 0x00000014 mov dword ptr [esp+04h], edx 0x00000018 add dword ptr [esp+04h], 00000018h 0x00000020 inc edx 0x00000021 push edx 0x00000022 ret 0x00000023 pop edx 0x00000024 ret 0x00000025 nop 0x00000026 push ebx 0x00000027 push eax 0x00000028 push edx 0x00000029 push eax 0x0000002a push edx 0x0000002b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D2ED78 second address: D2ED7C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D2EFE3 second address: D2EFED instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 js 00007F0C10DA4036h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D2EFED second address: D2F016 instructions: 0x00000000 rdtsc 0x00000002 js 00007F0C10EAEB36h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d pushad 0x0000000e jmp 00007F0C10EAEB48h 0x00000013 push edi 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D2F0E9 second address: D2F0EE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D2F0EE second address: D2F120 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0C10EAEB42h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b pushad 0x0000000c jg 00007F0C10EAEB36h 0x00000012 jmp 00007F0C10EAEB3Fh 0x00000017 popad 0x00000018 push edx 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D2F8E6 second address: D2F8F4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 js 00007F0C10DA4036h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D30232 second address: D302CB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007F0C10EAEB36h 0x0000000a popad 0x0000000b push eax 0x0000000c ja 00007F0C10EAEB4Eh 0x00000012 nop 0x00000013 mov dword ptr [ebp+122D2FEBh], edi 0x00000019 push 00000000h 0x0000001b mov edi, 2CFB9E18h 0x00000020 push 00000000h 0x00000022 push 00000000h 0x00000024 push ecx 0x00000025 call 00007F0C10EAEB38h 0x0000002a pop ecx 0x0000002b mov dword ptr [esp+04h], ecx 0x0000002f add dword ptr [esp+04h], 0000001Ah 0x00000037 inc ecx 0x00000038 push ecx 0x00000039 ret 0x0000003a pop ecx 0x0000003b ret 0x0000003c movsx esi, di 0x0000003f xchg eax, ebx 0x00000040 push ebx 0x00000041 je 00007F0C10EAEB4Fh 0x00000047 jmp 00007F0C10EAEB49h 0x0000004c pop ebx 0x0000004d push eax 0x0000004e push edx 0x0000004f push eax 0x00000050 push edx 0x00000051 jmp 00007F0C10EAEB44h 0x00000056 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D300D9 second address: D300DE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D31D5A second address: D31D60 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D31D60 second address: D31D64 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D333EE second address: D333F2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D375FC second address: D37601 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D34769 second address: D34770 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D34770 second address: D34786 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jnl 00007F0C10DA403Ch 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D37B6A second address: D37BB3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 nop 0x00000007 clc 0x00000008 push 00000000h 0x0000000a jmp 00007F0C10EAEB47h 0x0000000f push 00000000h 0x00000011 jno 00007F0C10EAEB50h 0x00000017 push eax 0x00000018 pushad 0x00000019 push eax 0x0000001a push edx 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D35289 second address: D352B8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0C10DA4043h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edi 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F0C10DA4044h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D37BB3 second address: D37BB7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D352B8 second address: D352BE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D3BCA8 second address: D3BCB1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D37E23 second address: D37E27 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D39C67 second address: D39C78 instructions: 0x00000000 rdtsc 0x00000002 ja 00007F0C10EAEB36h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push ecx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D3ADC7 second address: D3ADE8 instructions: 0x00000000 rdtsc 0x00000002 jp 00007F0C10DA4048h 0x00000008 jmp 00007F0C10DA4042h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 pushad 0x00000011 push ebx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D3BCB1 second address: D3BCB5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D39C78 second address: D39C7D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D39C7D second address: D39C84 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D3DC0C second address: D3DC16 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnc 00007F0C10DA4036h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D3CE17 second address: D3CE25 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push esi 0x00000004 pop esi 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D3DC16 second address: D3DC1A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D3CE25 second address: D3CE2C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D3DC1A second address: D3DC51 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 nop 0x00000009 mov bh, 4Eh 0x0000000b push 00000000h 0x0000000d mov bx, 8181h 0x00000011 push 00000000h 0x00000013 push 00000000h 0x00000015 push edi 0x00000016 call 00007F0C10DA4038h 0x0000001b pop edi 0x0000001c mov dword ptr [esp+04h], edi 0x00000020 add dword ptr [esp+04h], 00000015h 0x00000028 inc edi 0x00000029 push edi 0x0000002a ret 0x0000002b pop edi 0x0000002c ret 0x0000002d push eax 0x0000002e push eax 0x0000002f push edx 0x00000030 push eax 0x00000031 push edi 0x00000032 pop edi 0x00000033 pop eax 0x00000034 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D3CE2C second address: D3CE3A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0C10EAEB3Ah 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D3ECF2 second address: D3ED12 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 jmp 00007F0C10DA4041h 0x0000000c pop edx 0x0000000d popad 0x0000000e push eax 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D3EE2D second address: D3EEB2 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F0C10EAEB38h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dword ptr [esp], eax 0x0000000d and bh, 00000016h 0x00000010 push dword ptr fs:[00000000h] 0x00000017 push 00000000h 0x00000019 push edx 0x0000001a call 00007F0C10EAEB38h 0x0000001f pop edx 0x00000020 mov dword ptr [esp+04h], edx 0x00000024 add dword ptr [esp+04h], 00000017h 0x0000002c inc edx 0x0000002d push edx 0x0000002e ret 0x0000002f pop edx 0x00000030 ret 0x00000031 sbb bl, 00000072h 0x00000034 mov dword ptr fs:[00000000h], esp 0x0000003b mov dword ptr [ebp+122D2EC6h], ecx 0x00000041 mov eax, dword ptr [ebp+122D0271h] 0x00000047 or bx, A443h 0x0000004c push FFFFFFFFh 0x0000004e push 00000000h 0x00000050 push eax 0x00000051 call 00007F0C10EAEB38h 0x00000056 pop eax 0x00000057 mov dword ptr [esp+04h], eax 0x0000005b add dword ptr [esp+04h], 00000016h 0x00000063 inc eax 0x00000064 push eax 0x00000065 ret 0x00000066 pop eax 0x00000067 ret 0x00000068 movsx ebx, si 0x0000006b nop 0x0000006c push eax 0x0000006d push edx 0x0000006e jno 00007F0C10EAEB3Ch 0x00000074 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D3EEB2 second address: D3EEC9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 jmp 00007F0C10DA403Bh 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D40CEB second address: D40CF2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D3EEC9 second address: D3EECD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D41CDB second address: D41CE0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D41CE0 second address: D41CE6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D42F46 second address: D42F69 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F0C10EAEB38h 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d je 00007F0C10EAEB50h 0x00000013 push eax 0x00000014 push edx 0x00000015 jmp 00007F0C10EAEB3Eh 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D42F69 second address: D42F6D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D45B7C second address: D45BA8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 popad 0x00000008 mov dword ptr [esp], eax 0x0000000b and di, 47FDh 0x00000010 push 00000000h 0x00000012 js 00007F0C10EAEB39h 0x00000018 and bh, 00000060h 0x0000001b push 00000000h 0x0000001d movsx ebx, si 0x00000020 push eax 0x00000021 push eax 0x00000022 push edx 0x00000023 pushad 0x00000024 jp 00007F0C10EAEB36h 0x0000002a push eax 0x0000002b push edx 0x0000002c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D45BA8 second address: D45BAD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D44E23 second address: D44E3C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0C10EAEB3Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b push edi 0x0000000c jo 00007F0C10EAEB3Ch 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D45CF1 second address: D45CF7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D46CDF second address: D46CE5 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D4F4E2 second address: D4F503 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 pushad 0x00000007 popad 0x00000008 push edx 0x00000009 pop edx 0x0000000a jmp 00007F0C10DA4046h 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D4F503 second address: D4F51B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007F0C10EAEB42h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D4F51B second address: D4F55B instructions: 0x00000000 rdtsc 0x00000002 jng 00007F0C10DA4036h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007F0C10DA4048h 0x0000000f pop edx 0x00000010 pop eax 0x00000011 push eax 0x00000012 push edx 0x00000013 push esi 0x00000014 jmp 00007F0C10DA4042h 0x00000019 jng 00007F0C10DA4036h 0x0000001f pop esi 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D4F55B second address: D4F567 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jp 00007F0C10EAEB36h 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D4F7EB second address: D4F7EF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D4F7EF second address: D4F80E instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F0C10EAEB49h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D4F80E second address: D4F816 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D4F816 second address: D4F81A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D4F81A second address: D4F820 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D4F820 second address: D4F848 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jnl 00007F0C10EAEB3Ah 0x0000000c pushad 0x0000000d popad 0x0000000e push ebx 0x0000000f pop ebx 0x00000010 pop edx 0x00000011 pop eax 0x00000012 pushad 0x00000013 push eax 0x00000014 push edx 0x00000015 pushad 0x00000016 popad 0x00000017 jmp 00007F0C10EAEB41h 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D54E72 second address: D54E76 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D54E76 second address: D54EAD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 push eax 0x00000008 push ecx 0x00000009 jg 00007F0C10EAEB3Ch 0x0000000f pop ecx 0x00000010 mov eax, dword ptr [esp+04h] 0x00000014 push edi 0x00000015 jmp 00007F0C10EAEB3Fh 0x0000001a pop edi 0x0000001b mov eax, dword ptr [eax] 0x0000001d jng 00007F0C10EAEB4Fh 0x00000023 push eax 0x00000024 push edx 0x00000025 pushad 0x00000026 popad 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D59C83 second address: D59C99 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0C10DA4041h 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D59097 second address: D590B0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 jmp 00007F0C10EAEB43h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D594FE second address: D59508 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push edi 0x00000006 push ebx 0x00000007 pop ebx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D5966E second address: D59672 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D59672 second address: D5967B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push esi 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D5967B second address: D59680 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D59680 second address: D5968D instructions: 0x00000000 rdtsc 0x00000002 jng 00007F0C10DA4038h 0x00000008 push ebx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D59983 second address: D59987 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D59987 second address: D5998B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D5998B second address: D599AC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a js 00007F0C10EAEB38h 0x00000010 push eax 0x00000011 pop eax 0x00000012 jmp 00007F0C10EAEB3Fh 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D59B17 second address: D59B1D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D59B1D second address: D59B2F instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push edi 0x00000004 pop edi 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jl 00007F0C10EAEB5Dh 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D59B2F second address: D59B33 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D361D4 second address: D361FD instructions: 0x00000000 rdtsc 0x00000002 jng 00007F0C10EAEB36h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jng 00007F0C10EAEB4Bh 0x00000014 jmp 00007F0C10EAEB45h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D361FD second address: D36203 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D36203 second address: D36207 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D36207 second address: B8890F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 nop 0x00000009 mov ecx, dword ptr [ebp+1246C866h] 0x0000000f push dword ptr [ebp+122D0C71h] 0x00000015 call dword ptr [ebp+122D3013h] 0x0000001b pushad 0x0000001c jmp 00007F0C10DA4043h 0x00000021 xor eax, eax 0x00000023 jng 00007F0C10DA4037h 0x00000029 mov edx, dword ptr [esp+28h] 0x0000002d or dword ptr [ebp+122D2630h], edx 0x00000033 cmc 0x00000034 mov dword ptr [ebp+122D34DEh], eax 0x0000003a pushad 0x0000003b mov dword ptr [ebp+122D2630h], ebx 0x00000041 popad 0x00000042 mov esi, 0000003Ch 0x00000047 pushad 0x00000048 mov ax, cx 0x0000004b popad 0x0000004c add esi, dword ptr [esp+24h] 0x00000050 jmp 00007F0C10DA403Fh 0x00000055 lodsw 0x00000057 sub dword ptr [ebp+122D2630h], ecx 0x0000005d add eax, dword ptr [esp+24h] 0x00000061 mov dword ptr [ebp+122D2630h], esi 0x00000067 mov ebx, dword ptr [esp+24h] 0x0000006b jmp 00007F0C10DA4042h 0x00000070 push eax 0x00000071 pushad 0x00000072 jmp 00007F0C10DA403Dh 0x00000077 pushad 0x00000078 push eax 0x00000079 push edx 0x0000007a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D362B9 second address: D362BF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D36522 second address: D36529 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D3674D second address: D367B2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edi 0x00000007 mov dword ptr [esp], eax 0x0000000a push 00000000h 0x0000000c push esi 0x0000000d call 00007F0C10EAEB38h 0x00000012 pop esi 0x00000013 mov dword ptr [esp+04h], esi 0x00000017 add dword ptr [esp+04h], 00000015h 0x0000001f inc esi 0x00000020 push esi 0x00000021 ret 0x00000022 pop esi 0x00000023 ret 0x00000024 mov edi, dword ptr [ebp+122D2F4Fh] 0x0000002a cld 0x0000002b push 00000004h 0x0000002d push 00000000h 0x0000002f push ecx 0x00000030 call 00007F0C10EAEB38h 0x00000035 pop ecx 0x00000036 mov dword ptr [esp+04h], ecx 0x0000003a add dword ptr [esp+04h], 0000001Ah 0x00000042 inc ecx 0x00000043 push ecx 0x00000044 ret 0x00000045 pop ecx 0x00000046 ret 0x00000047 push edi 0x00000048 mov edx, dword ptr [ebp+122D193Fh] 0x0000004e pop edx 0x0000004f nop 0x00000050 jc 00007F0C10EAEB48h 0x00000056 push eax 0x00000057 push edx 0x00000058 push eax 0x00000059 push edx 0x0000005a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D367B2 second address: D367B6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D367B6 second address: D367D1 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F0C10EAEB36h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b pushad 0x0000000c jng 00007F0C10EAEB3Ch 0x00000012 jg 00007F0C10EAEB36h 0x00000018 pushad 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D331C1 second address: D331C5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D36DEA second address: D36E1D instructions: 0x00000000 rdtsc 0x00000002 je 00007F0C10EAEB36h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov eax, dword ptr [esp+04h] 0x0000000e jbe 00007F0C10EAEB4Ah 0x00000014 jmp 00007F0C10EAEB44h 0x00000019 mov eax, dword ptr [eax] 0x0000001b push ebx 0x0000001c push eax 0x0000001d push edx 0x0000001e jg 00007F0C10EAEB36h 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D36EEB second address: D15AD2 instructions: 0x00000000 rdtsc 0x00000002 je 00007F0C10DA4036h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a nop 0x0000000b mov edi, dword ptr [ebp+122D2764h] 0x00000011 lea eax, dword ptr [ebp+12480A20h] 0x00000017 jno 00007F0C10DA403Ch 0x0000001d push eax 0x0000001e jmp 00007F0C10DA4044h 0x00000023 mov dword ptr [esp], eax 0x00000026 mov edi, dword ptr [ebp+122D1E0Dh] 0x0000002c lea eax, dword ptr [ebp+124809DCh] 0x00000032 push eax 0x00000033 jnc 00007F0C10DA404Dh 0x00000039 mov dword ptr [esp], eax 0x0000003c push 00000000h 0x0000003e push ecx 0x0000003f call 00007F0C10DA4038h 0x00000044 pop ecx 0x00000045 mov dword ptr [esp+04h], ecx 0x00000049 add dword ptr [esp+04h], 00000014h 0x00000051 inc ecx 0x00000052 push ecx 0x00000053 ret 0x00000054 pop ecx 0x00000055 ret 0x00000056 call dword ptr [ebp+1244606Fh] 0x0000005c push eax 0x0000005d push edx 0x0000005e push eax 0x0000005f push eax 0x00000060 push edx 0x00000061 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D15AD2 second address: D15AEF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 jmp 00007F0C10EAEB48h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D15AEF second address: D15AF5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D15AF5 second address: D15B13 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jne 00007F0C10EAEB36h 0x00000010 jmp 00007F0C10EAEB3Eh 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D5D324 second address: D5D328 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D5D328 second address: D5D339 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0C10EAEB3Dh 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D5D339 second address: D5D355 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F0C10DA4046h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D5D355 second address: D5D35E instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pushad 0x00000004 popad 0x00000005 pop ebx 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D5D4C3 second address: D5D4D2 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F0C10DA403Ah 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D5D4D2 second address: D5D526 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnp 00007F0C10EAEB36h 0x0000000a pushad 0x0000000b popad 0x0000000c jmp 00007F0C10EAEB49h 0x00000011 popad 0x00000012 pop edx 0x00000013 pop eax 0x00000014 pushad 0x00000015 jmp 00007F0C10EAEB41h 0x0000001a jg 00007F0C10EAEB3Ch 0x00000020 push eax 0x00000021 push edx 0x00000022 jmp 00007F0C10EAEB3Ch 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D5D526 second address: D5D52A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D5D821 second address: D5D82A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D5D82A second address: D5D836 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 jc 00007F0C10DA4036h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D5D999 second address: D5D9A0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D5D9A0 second address: D5D9AA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnc 00007F0C10DA4036h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D5DAE8 second address: D5DAEE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D64B5F second address: D64B87 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop ebx 0x00000007 popad 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F0C10DA4046h 0x00000011 jng 00007F0C10DA4036h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D64B87 second address: D64BA2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0C10EAEB43h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push esi 0x0000000a pushad 0x0000000b popad 0x0000000c pop esi 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: CF0A6B second address: CF0A71 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: CF0A71 second address: CF0A77 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D63413 second address: D6341A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D6341A second address: D63446 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jo 00007F0C10EAEB36h 0x0000000a jmp 00007F0C10EAEB49h 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 jnl 00007F0C10EAEB36h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D636F9 second address: D6370C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 jmp 00007F0C10DA403Eh 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D63B68 second address: D63B76 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pushad 0x00000006 jns 00007F0C10EAEB36h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D63D0A second address: D63D21 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0C10DA4042h 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D63D21 second address: D63D26 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D63D26 second address: D63D5B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 jmp 00007F0C10DA403Fh 0x0000000b popad 0x0000000c jng 00007F0C10DA403Ch 0x00000012 pop edx 0x00000013 pop eax 0x00000014 push edx 0x00000015 jne 00007F0C10DA4038h 0x0000001b push eax 0x0000001c push edx 0x0000001d jng 00007F0C10DA4036h 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D63D5B second address: D63D5F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D63EB1 second address: D63ED0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F0C10DA4040h 0x00000008 jne 00007F0C10DA4036h 0x0000000e push edx 0x0000000f pop edx 0x00000010 popad 0x00000011 push eax 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D64035 second address: D6407C instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F0C10EAEB36h 0x00000008 jno 00007F0C10EAEB36h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 jno 00007F0C10EAEB46h 0x00000016 popad 0x00000017 pushad 0x00000018 pushad 0x00000019 jng 00007F0C10EAEB36h 0x0000001f pushad 0x00000020 popad 0x00000021 pushad 0x00000022 popad 0x00000023 popad 0x00000024 push edx 0x00000025 jmp 00007F0C10EAEB40h 0x0000002a push eax 0x0000002b push edx 0x0000002c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D64316 second address: D64327 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop ecx 0x00000007 push eax 0x00000008 push edx 0x00000009 je 00007F0C10DA4036h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D64327 second address: D6432B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D6432B second address: D64331 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D64331 second address: D64336 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D644DC second address: D644F7 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F0C10DA4036h 0x00000008 jng 00007F0C10DA4036h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 pushad 0x00000011 push edi 0x00000012 pop edi 0x00000013 jne 00007F0C10DA4036h 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D644F7 second address: D644FC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D649F5 second address: D649FE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D649FE second address: D64A04 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D64A04 second address: D64A1A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F0C10DA403Eh 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D63161 second address: D63167 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D63167 second address: D63175 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pushad 0x00000006 js 00007F0C10DA4036h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D673BF second address: D673D8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0C10EAEB3Fh 0x00000009 jno 00007F0C10EAEB36h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D673D8 second address: D673DC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D673DC second address: D673F6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F0C10EAEB42h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D673F6 second address: D67411 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0C10DA4041h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c push esi 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D6A70C second address: D6A710 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D6A710 second address: D6A71F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0C10DA403Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D6A71F second address: D6A726 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D6ED77 second address: D6EDBE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0C10DA4049h 0x00000009 jmp 00007F0C10DA4049h 0x0000000e popad 0x0000000f push esi 0x00000010 jne 00007F0C10DA4036h 0x00000016 pop esi 0x00000017 jg 00007F0C10DA4042h 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D6EDBE second address: D6EDC4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D6F09C second address: D6F0AC instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 jo 00007F0C10DA4036h 0x0000000b pop esi 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D6F0AC second address: D6F0B2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D6F0B2 second address: D6F0B6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D6F0B6 second address: D6F0BA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D6F0BA second address: D6F0C0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D6F0C0 second address: D6F0CE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 pushad 0x0000000a pushad 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D6F53F second address: D6F549 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F0C10DA403Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D6F83D second address: D6F848 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D6F848 second address: D6F854 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push eax 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D6FB16 second address: D6FB22 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jnl 00007F0C10EAEB36h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D75381 second address: D753C7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0C10DA4042h 0x00000009 jmp 00007F0C10DA403Dh 0x0000000e popad 0x0000000f pop edx 0x00000010 pushad 0x00000011 jne 00007F0C10DA4042h 0x00000017 jng 00007F0C10DA4036h 0x0000001d jnp 00007F0C10DA4036h 0x00000023 push eax 0x00000024 push edx 0x00000025 js 00007F0C10DA4036h 0x0000002b jc 00007F0C10DA4036h 0x00000031 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D75697 second address: D7569C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D77C6E second address: D77C79 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D77C79 second address: D77C7D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D77C7D second address: D77CA1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c pushad 0x0000000d popad 0x0000000e push eax 0x0000000f pop eax 0x00000010 push edx 0x00000011 pop edx 0x00000012 jmp 00007F0C10DA4041h 0x00000017 popad 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D7CA9E second address: D7CAAD instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 js 00007F0C10EAEB3Ch 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D7CAAD second address: D7CAD9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0C10DA4044h 0x00000009 pushad 0x0000000a jmp 00007F0C10DA4041h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D7BD9F second address: D7BDA5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D7BDA5 second address: D7BDA9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D7BEEA second address: D7BEF0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D7BEF0 second address: D7BEF7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D7BEF7 second address: D7BEFC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D7C087 second address: D7C0A1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007F0C10DA403Dh 0x0000000c jc 00007F0C10DA4036h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D7C1F8 second address: D7C1FE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D7C1FE second address: D7C219 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F0C10DA403Fh 0x0000000b popad 0x0000000c push ecx 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D7C219 second address: D7C21D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D7C21D second address: D7C221 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D7C35B second address: D7C362 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D82409 second address: D8240D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D8240D second address: D82435 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push esi 0x00000007 je 00007F0C10EAEB36h 0x0000000d pop esi 0x0000000e pushad 0x0000000f jne 00007F0C10EAEB36h 0x00000015 jnp 00007F0C10EAEB36h 0x0000001b popad 0x0000001c popad 0x0000001d push eax 0x0000001e jo 00007F0C10EAEB3Eh 0x00000024 pushad 0x00000025 popad 0x00000026 push eax 0x00000027 push edx 0x00000028 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D80CB1 second address: D80CC6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0C10DA4041h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D80CC6 second address: D80CCA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D81146 second address: D81150 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnp 00007F0C10DA4036h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D369AD second address: D369C7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0C10EAEB43h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push ebx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D369C7 second address: D36A05 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 popad 0x00000006 mov dword ptr [esp], eax 0x00000009 mov edi, edx 0x0000000b push 00000004h 0x0000000d jmp 00007F0C10DA4047h 0x00000012 push eax 0x00000013 push eax 0x00000014 push edx 0x00000015 jp 00007F0C10DA4047h 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D815A1 second address: D815A9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D815A9 second address: D815B4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push esi 0x00000008 pop esi 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D815B4 second address: D815B8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D815B8 second address: D815CE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 popad 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F0C10DA403Ah 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D815CE second address: D815FB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0C10EAEB43h 0x00000007 jc 00007F0C10EAEB36h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pushad 0x00000010 pushad 0x00000011 popad 0x00000012 push esi 0x00000013 pop esi 0x00000014 push edi 0x00000015 pop edi 0x00000016 popad 0x00000017 jnp 00007F0C10EAEB42h 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D81734 second address: D8173A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D8173A second address: D8174B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jg 00007F0C10EAEB3Ch 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D8174B second address: D8176C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0C10DA403Dh 0x00000007 jnp 00007F0C10DA403Ch 0x0000000d je 00007F0C10DA4036h 0x00000013 pop edx 0x00000014 pop eax 0x00000015 pushad 0x00000016 push eax 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D82149 second address: D8215E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F0C10EAEB3Ch 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D8215E second address: D8216C instructions: 0x00000000 rdtsc 0x00000002 jng 00007F0C10DA4036h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push edi 0x0000000d pop edi 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D860AB second address: D860DE instructions: 0x00000000 rdtsc 0x00000002 jne 00007F0C10EAEB3Ah 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007F0C10EAEB3Dh 0x0000000f jmp 00007F0C10EAEB48h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D860DE second address: D860EF instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ecx 0x00000009 push eax 0x0000000a push edx 0x0000000b jnl 00007F0C10DA4036h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D85785 second address: D8578F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 push ebx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D858E5 second address: D858EB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D85A19 second address: D85A1E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D85A1E second address: D85A2E instructions: 0x00000000 rdtsc 0x00000002 js 00007F0C10DA4038h 0x00000008 push edx 0x00000009 pop edx 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D85A2E second address: D85A32 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D85D50 second address: D85D56 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D85D56 second address: D85D5A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D8D3BD second address: D8D413 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F0C10DA4041h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jmp 00007F0C10DA403Ch 0x00000010 popad 0x00000011 pushad 0x00000012 push esi 0x00000013 jmp 00007F0C10DA4045h 0x00000018 push esi 0x00000019 pop esi 0x0000001a pop esi 0x0000001b jmp 00007F0C10DA4044h 0x00000020 push eax 0x00000021 push edx 0x00000022 pushad 0x00000023 popad 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D8D413 second address: D8D417 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D8D417 second address: D8D420 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D8B6D8 second address: D8B6E9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jnc 00007F0C10EAEB36h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push edi 0x0000000d pushad 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D8B6E9 second address: D8B6F6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 jc 00007F0C10DA4042h 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D8BC8B second address: D8BCA6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F0C10EAEB45h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D8BCA6 second address: D8BCC3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007F0C10DA4047h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D8C57C second address: D8C580 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D8C580 second address: D8C58A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D8C58A second address: D8C58E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D8C825 second address: D8C82E instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ebx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D8C82E second address: D8C85D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0C10EAEB48h 0x00000009 pop ebx 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F0C10EAEB40h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D8CB38 second address: D8CB3E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D90FB1 second address: D90FB5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D90FB5 second address: D90FB9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D90FB9 second address: D90FBF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D90FBF second address: D90FD4 instructions: 0x00000000 rdtsc 0x00000002 jne 00007F0C10DA403Eh 0x00000008 pushad 0x00000009 push eax 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D90FD4 second address: D90FDA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D912AD second address: D912D0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007F0C10DA4036h 0x0000000a pop edi 0x0000000b pop esi 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F0C10DA4045h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D916DF second address: D916E5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D916E5 second address: D916EB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D9CFA3 second address: D9CFC8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 je 00007F0C10EAEB36h 0x0000000d jmp 00007F0C10EAEB48h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D9CFC8 second address: D9CFEE instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 jmp 00007F0C10DA403Ah 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jnc 00007F0C10DA4038h 0x00000013 jnl 00007F0C10DA403Ch 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D9D15F second address: D9D165 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D9D700 second address: D9D704 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D9D704 second address: D9D738 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 jmp 00007F0C10EAEB49h 0x0000000e jmp 00007F0C10EAEB40h 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D9D738 second address: D9D743 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D9D743 second address: D9D747 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D9DB4C second address: D9DB60 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push edi 0x00000009 jne 00007F0C10DA4036h 0x0000000f pop edi 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D9DB60 second address: D9DB66 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D9DB66 second address: D9DB6A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D9DE41 second address: D9DE5F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0C10EAEB43h 0x00000009 pushad 0x0000000a popad 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e push esi 0x0000000f pop esi 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D9E51A second address: D9E54D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0C10DA403Fh 0x00000009 popad 0x0000000a jmp 00007F0C10DA4040h 0x0000000f jmp 00007F0C10DA403Bh 0x00000014 push eax 0x00000015 push edx 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D9E54D second address: D9E557 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnl 00007F0C10EAEB36h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D9E557 second address: D9E569 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 ja 00007F0C10DA4042h 0x0000000d pushad 0x0000000e push esi 0x0000000f pop esi 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D9ECD6 second address: D9ECFE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007F0C10EAEB3Fh 0x0000000c jmp 00007F0C10EAEB42h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: DA3A0D second address: DA3A13 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: DA3A13 second address: DA3A1F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push edx 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: DA3A1F second address: DA3A23 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: DA3A23 second address: DA3A27 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: DA3A27 second address: DA3A2D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: DA3A2D second address: DA3A49 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F0C10EAEB4Eh 0x00000008 jmp 00007F0C10EAEB42h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: DA3A49 second address: DA3A6C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 jmp 00007F0C10DA4043h 0x0000000a push esi 0x0000000b pop esi 0x0000000c pushad 0x0000000d popad 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 push ebx 0x00000012 pushad 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: DA3A6C second address: DA3A72 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: DA3A72 second address: DA3A78 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: DA3A78 second address: DA3A9E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pushad 0x00000008 jl 00007F0C10EAEB36h 0x0000000e jmp 00007F0C10EAEB46h 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: DA3A9E second address: DA3AA4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: CEB85B second address: CEB867 instructions: 0x00000000 rdtsc 0x00000002 je 00007F0C10EAEB36h 0x00000008 push eax 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: CEB867 second address: CEB899 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 jp 00007F0C10DA4036h 0x00000009 jnl 00007F0C10DA4036h 0x0000000f pop edi 0x00000010 pushad 0x00000011 je 00007F0C10DA4036h 0x00000017 pushad 0x00000018 popad 0x00000019 popad 0x0000001a pop edx 0x0000001b pop eax 0x0000001c push eax 0x0000001d push edx 0x0000001e pushad 0x0000001f jmp 00007F0C10DA403Bh 0x00000024 jg 00007F0C10DA4036h 0x0000002a push eax 0x0000002b push edx 0x0000002c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: CEB899 second address: CEB8C3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0C10EAEB41h 0x00000009 popad 0x0000000a pushad 0x0000000b jmp 00007F0C10EAEB41h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: CEB8C3 second address: CEB8C9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: CEB8C9 second address: CEB8CE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: CEB8CE second address: CEB8D4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: DA8453 second address: DA8457 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: DA8457 second address: DA8463 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007F0C10DA4036h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: DA8463 second address: DA846F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jns 00007F0C10EAEB36h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: DB4EA5 second address: DB4F1B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 pushad 0x0000000a popad 0x0000000b jmp 00007F0C10DA4049h 0x00000010 ja 00007F0C10DA4036h 0x00000016 popad 0x00000017 popad 0x00000018 pushad 0x00000019 jmp 00007F0C10DA4047h 0x0000001e jmp 00007F0C10DA4044h 0x00000023 pushad 0x00000024 jmp 00007F0C10DA4045h 0x00000029 push ebx 0x0000002a pop ebx 0x0000002b popad 0x0000002c push ebx 0x0000002d pushad 0x0000002e popad 0x0000002f push eax 0x00000030 push edx 0x00000031 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: DB78EC second address: DB78F1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: DBE511 second address: DBE525 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0C10DA4040h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: DBE525 second address: DBE52E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: DCDD1D second address: DCDD21 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: DD2F63 second address: DD2F80 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F0C10EAEB42h 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: DD2F80 second address: DD2F90 instructions: 0x00000000 rdtsc 0x00000002 jne 00007F0C10DA4036h 0x00000008 jnc 00007F0C10DA4036h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: DD2F90 second address: DD2FB5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0C10EAEB43h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jnc 00007F0C10EAEB3Ch 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: DD2FB5 second address: DD2FBD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: DD2FBD second address: DD2FC7 instructions: 0x00000000 rdtsc 0x00000002 ja 00007F0C10EAEB36h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: DD2FC7 second address: DD2FE2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F0C10DA403Dh 0x0000000d jnl 00007F0C10DA4036h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: DD3117 second address: DD311B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: DD311B second address: DD3121 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: DD3121 second address: DD3127 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: DD3127 second address: DD312D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: DD312D second address: DD3131 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: DD3131 second address: DD3135 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: DD3135 second address: DD3144 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push edx 0x0000000a pop edx 0x0000000b push edx 0x0000000c pop edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: DD33C7 second address: DD33CB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: CE68FA second address: CE68FE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: DD9898 second address: DD989E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: DD942D second address: DD9433 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: DD9433 second address: DD9438 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: DD9438 second address: DD9446 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 js 00007F0C10EAEB36h 0x00000009 pop edx 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: DD9446 second address: DD944C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: DD9594 second address: DD959E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007F0C10EAEB36h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: DD959E second address: DD95A8 instructions: 0x00000000 rdtsc 0x00000002 ja 00007F0C10DA4036h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: DD95A8 second address: DD95B0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: DE7F12 second address: DE7F1A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 push eax 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: DE7F1A second address: DE7F37 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0C10EAEB3Dh 0x00000007 jmp 00007F0C10EAEB3Ch 0x0000000c pop edx 0x0000000d pop eax 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: DE978E second address: DE9798 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007F0C10DA4036h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: DE9798 second address: DE979E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: DE979E second address: DE97B8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop edi 0x00000005 jmp 00007F0C10DA4043h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: DE9605 second address: DE9610 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 je 00007F0C10EAEB36h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: DE32E1 second address: DE32E5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: DE32E5 second address: DE3301 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0C10EAEB44h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: DE3301 second address: DE3307 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: DE3307 second address: DE3310 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: DE3310 second address: DE3318 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: DE3318 second address: DE3338 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007F0C10EAEB47h 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: DE3338 second address: DE333C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: DE333C second address: DE3342 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: DF6533 second address: DF653F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnl 00007F0C10DA4036h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E0BF4A second address: E0BF51 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E0BF51 second address: E0BF5E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 jne 00007F0C10DA4036h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E0B2C6 second address: E0B2DF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pushad 0x00000006 jmp 00007F0C10EAEB3Ah 0x0000000b jnl 00007F0C10EAEB36h 0x00000011 push edx 0x00000012 pop edx 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E0B2DF second address: E0B307 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0C10DA4048h 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F0C10DA403Ah 0x0000000e push eax 0x0000000f pop eax 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E0B640 second address: E0B64A instructions: 0x00000000 rdtsc 0x00000002 jp 00007F0C10EAEB3Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E0B94F second address: E0B953 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E0BAE3 second address: E0BAE7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E0E91D second address: E0E923 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E0EA06 second address: E0EA0A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E0EC71 second address: E0EC85 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0C10DA4040h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E0EC85 second address: E0ECCB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a jmp 00007F0C10EAEB3Bh 0x0000000f push edx 0x00000010 jmp 00007F0C10EAEB40h 0x00000015 pop edx 0x00000016 popad 0x00000017 nop 0x00000018 mov dx, bx 0x0000001b push 00000004h 0x0000001d mov edx, esi 0x0000001f jmp 00007F0C10EAEB3Ch 0x00000024 push E83CF0D0h 0x00000029 push eax 0x0000002a push eax 0x0000002b push edx 0x0000002c push eax 0x0000002d push edx 0x0000002e rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E0ECCB second address: E0ECCF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D30D6A second address: D30D6E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D30D6E second address: D30D74 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D30D74 second address: D30D78 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D30F97 second address: D30F9B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: D30F9B second address: D30FB3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0C10EAEB44h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |