Source: 352def4414.exe, 0000002D.00000003.3055975665.0000000007180000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://.css |
Source: 352def4414.exe, 0000002D.00000003.3055975665.0000000007180000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://.jpg |
Source: d5cd5e4aa8.exe, 0000002E.00000002.4041357716.00000000055E0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.156.73.23/add?substr=mixtwo&s=three&sub=empNK |
Source: d5cd5e4aa8.exe, 0000002E.00000002.4041357716.00000000055E0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.156.73.23/add?substr=mixtwo&s=three&sub=empaK |
Source: d5cd5e4aa8.exe, 0000002E.00000002.4018413567.0000000000F54000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.156.73.23/dll/download |
Source: d5cd5e4aa8.exe, 0000002E.00000002.4018413567.0000000000F54000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.156.73.23/dll/download)%N |
Source: d5cd5e4aa8.exe, 0000002E.00000002.4041357716.00000000055E0000.00000004.00000020.00020000.00000000.sdmp, d5cd5e4aa8.exe, 0000002E.00000003.3718296864.0000000000FF4000.00000004.00000020.00020000.00000000.sdmp, d5cd5e4aa8.exe, 0000002E.00000003.3780362783.0000000000FF4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.156.73.23/dll/key |
Source: d5cd5e4aa8.exe, 0000002E.00000002.4041357716.00000000055E0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.156.73.23/dll/keybnZ |
Source: d5cd5e4aa8.exe, 0000002E.00000003.3608285796.00000000056D2000.00000004.00000020.00020000.00000000.sdmp, d5cd5e4aa8.exe, 0000002E.00000003.3780362783.0000000000FF4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.156.73.23/files/download |
Source: d5cd5e4aa8.exe, 0000002E.00000003.3718296864.0000000000FF4000.00000004.00000020.00020000.00000000.sdmp, d5cd5e4aa8.exe, 0000002E.00000003.3780362783.0000000000FF4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.156.73.23/files/download(ho |
Source: d5cd5e4aa8.exe, 0000002E.00000003.3718296864.0000000000FF4000.00000004.00000020.00020000.00000000.sdmp, d5cd5e4aa8.exe, 0000002E.00000003.3780362783.0000000000FF4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.156.73.23/files/download.hi |
Source: d5cd5e4aa8.exe, 0000002E.00000002.4018413567.0000000000F54000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.156.73.23/files/download=%Z |
Source: d5cd5e4aa8.exe, 0000002E.00000002.4041645751.000000000567C000.00000004.00000020.00020000.00000000.sdmp, d5cd5e4aa8.exe, 0000002E.00000003.3864020294.000000000595C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.156.73.23/soft/download |
Source: d5cd5e4aa8.exe, 0000002E.00000003.3864248822.000000000595C000.00000004.00000020.00020000.00000000.sdmp, d5cd5e4aa8.exe, 0000002E.00000003.3864020294.000000000595C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.156.73.23/soft/download&% |
Source: d5cd5e4aa8.exe, 0000002E.00000002.4018413567.0000000000F54000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.156.73.23/soft/downloadI$. |
Source: ea17d0b77a.exe, 0000002F.00000003.3627075029.00000000010F5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/ |
Source: ea17d0b77a.exe, 0000002F.00000003.3627075029.00000000010F5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/VB |
Source: ea17d0b77a.exe, 0000002F.00000003.3627075029.00000000010F5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/aMoh |
Source: 9434b989db.exe, 00000030.00000002.4214117571.00000000007CF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/mine/random.exe |
Source: 9434b989db.exe, 00000030.00000002.4214117571.00000000007A4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/mine/random.exeT |
Source: ea17d0b77a.exe, 0000002F.00000003.3627075029.00000000010F5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/off/def.exe |
Source: ea17d0b77a.exe, 0000002F.00000003.3627075029.0000000001108000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/off/def.exeJ |
Source: ea17d0b77a.exe, 0000002F.00000003.3627075029.00000000010F5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/steam/random.exe |
Source: ea17d0b77a.exe, 0000002F.00000003.3627075029.00000000010F5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/steam/random.exe: |
Source: 9434b989db.exe, 00000030.00000002.4214117571.000000000075E000.00000004.00000020.00020000.00000000.sdmp, 9434b989db.exe, 00000030.00000002.4222202528.0000000000FA4000.00000040.00000001.01000000.00000013.sdmp, 9434b989db.exe, 00000030.00000002.4222202528.0000000000FEC000.00000040.00000001.01000000.00000013.sdmp | String found in binary or memory: http://185.215.113.206 |
Source: 9434b989db.exe, 00000030.00000002.4214117571.00000000007B7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.206/ |
Source: 9434b989db.exe, 00000030.00000002.4214117571.00000000007CF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.206/68b591d6548ec281/freebl3.dll |
Source: 9434b989db.exe, 00000030.00000002.4214117571.00000000007CF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.206/68b591d6548ec281/mozglue.dll |
Source: 9434b989db.exe, 00000030.00000002.4214117571.00000000007B7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.206/68b591d6548ec281/msvcp140.dll |
Source: 9434b989db.exe, 00000030.00000002.4214117571.00000000007CF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.206/68b591d6548ec281/nss3.dll |
Source: 9434b989db.exe, 00000030.00000002.4214117571.00000000007CF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.206/68b591d6548ec281/nss3.dll5G |
Source: 9434b989db.exe, 00000030.00000002.4214117571.00000000007B7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.206/68b591d6548ec281/softokn3.dll |
Source: 9434b989db.exe, 00000030.00000002.4214117571.00000000007CF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.206/68b591d6548ec281/sqlite3.dll |
Source: 9434b989db.exe, 00000030.00000002.4214117571.00000000007CF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.206/68b591d6548ec281/vcruntime140.dll |
Source: 9434b989db.exe, 00000030.00000002.4222202528.0000000000FA4000.00000040.00000001.01000000.00000013.sdmp, 9434b989db.exe, 00000030.00000002.4214117571.00000000007CF000.00000004.00000020.00020000.00000000.sdmp, 9434b989db.exe, 00000030.00000002.4214117571.00000000007B7000.00000004.00000020.00020000.00000000.sdmp, 9434b989db.exe, 00000030.00000002.4222202528.0000000000FEC000.00000040.00000001.01000000.00000013.sdmp | String found in binary or memory: http://185.215.113.206/c4becf79229cb002.php |
Source: 9434b989db.exe, 00000030.00000002.4222202528.0000000000FEC000.00000040.00000001.01000000.00000013.sdmp | String found in binary or memory: http://185.215.113.206/c4becf79229cb002.phpecee80c0ba92f6f38a0bad9769dfExtension |
Source: 9434b989db.exe, 00000030.00000002.4222202528.0000000000FA4000.00000040.00000001.01000000.00000013.sdmp | String found in binary or memory: http://185.215.113.206/c4becf79229cb002.phpge |
Source: 9434b989db.exe, 00000030.00000002.4214117571.00000000007CF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.206/c4becf79229cb002.phpx |
Source: 9434b989db.exe, 00000030.00000002.4214117571.00000000007B7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.206/dq |
Source: 9434b989db.exe, 00000030.00000002.4222202528.0000000000FEC000.00000040.00000001.01000000.00000013.sdmp | String found in binary or memory: http://185.215.113.206c4becf79229cb002.phpge |
Source: 9434b989db.exe, 00000030.00000002.4222202528.0000000000FA4000.00000040.00000001.01000000.00000013.sdmp | String found in binary or memory: http://185.215.113.206ta |
Source: ea17d0b77a.exe, 0000002F.00000003.3356767068.00000000059BC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0 |
Source: ea17d0b77a.exe, 0000002F.00000003.3356767068.00000000059BC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B |
Source: ea17d0b77a.exe, 0000002F.00000003.3503997226.00000000010DF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.micro8 |
Source: ea17d0b77a.exe, 0000002F.00000003.3356767068.00000000059BC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0 |
Source: c359af6492.exe.14.dr | String found in binary or memory: http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0z |
Source: c359af6492.exe.14.dr | String found in binary or memory: http://crl.sectigo.com/SectigoPublicTimeStampingRootR46.crl0 |
Source: ea17d0b77a.exe, 0000002F.00000003.3356767068.00000000059BC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07 |
Source: ea17d0b77a.exe, 0000002F.00000003.3356767068.00000000059BC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0= |
Source: ea17d0b77a.exe, 0000002F.00000003.3356767068.00000000059BC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00 |
Source: ea17d0b77a.exe, 0000002F.00000003.3356767068.00000000059BC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0? |
Source: c359af6492.exe.14.dr | String found in binary or memory: http://crt.sectigo.com/SectigoPublicTimeStampingCAR36.crt0# |
Source: c359af6492.exe.14.dr | String found in binary or memory: http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0# |
Source: 352def4414.exe, 0000002D.00000003.3055975665.0000000007180000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://home.twentytk20ht.top/TQIuuaqjNpwYjtUvFoj850 |
Source: 352def4414.exe, 0000002D.00000003.3055975665.0000000007180000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://html4/loose.dtd |
Source: ea17d0b77a.exe, 0000002F.00000003.3356767068.00000000059BC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0 |
Source: ea17d0b77a.exe, 0000002F.00000003.3356767068.00000000059BC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.rootca1.amazontrust.com0: |
Source: c359af6492.exe.14.dr | String found in binary or memory: http://ocsp.sectigo.com0 |
Source: c359af6492.exe, 00000010.00000000.2914213620.0000000000423000.00000002.00000001.01000000.0000000B.sdmp, c359af6492.exe.14.dr | String found in binary or memory: http://usbtor.ru/viewtopic.php?t=798)Z |
Source: d5cd5e4aa8.exe, 0000002E.00000003.3864248822.000000000585D000.00000004.00000020.00020000.00000000.sdmp, d5cd5e4aa8.exe, 0000002E.00000003.3868146778.000000000595F000.00000004.00000020.00020000.00000000.sdmp, d5cd5e4aa8.exe, 0000002E.00000003.3864248822.000000000595C000.00000004.00000020.00020000.00000000.sdmp, d5cd5e4aa8.exe, 0000002E.00000003.3868658111.00000000059A2000.00000004.00000020.00020000.00000000.sdmp, d5cd5e4aa8.exe, 0000002E.00000003.3869728348.000000000595F000.00000004.00000020.00020000.00000000.sdmp, d5cd5e4aa8.exe, 0000002E.00000003.3863773219.000000000569F000.00000004.00000020.00020000.00000000.sdmp, d5cd5e4aa8.exe, 0000002E.00000003.3869516834.0000000005A31000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.ccleaner.comqhttps://take.rdrct-now.online/go/ZWKA?p78705p298845p1174 |
Source: ea17d0b77a.exe, 0000002F.00000003.3356767068.00000000059BC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://x1.c.lencr.org/0 |
Source: ea17d0b77a.exe, 0000002F.00000003.3356767068.00000000059BC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://x1.i.lencr.org/0 |
Source: ea17d0b77a.exe, 0000002F.00000003.3289351345.00000000059CB000.00000004.00000800.00020000.00000000.sdmp, ea17d0b77a.exe, 0000002F.00000003.3288988344.00000000059CE000.00000004.00000800.00020000.00000000.sdmp, ea17d0b77a.exe, 0000002F.00000003.3289219383.00000000059CB000.00000004.00000800.00020000.00000000.sdmp, 9434b989db.exe, 00000030.00000003.3524665677.0000000000827000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ac.ecosia.org/autocomplete?q= |
Source: ea17d0b77a.exe, 0000002F.00000003.3361781382.0000000005992000.00000004.00000800.00020000.00000000.sdmp, ea17d0b77a.exe, 0000002F.00000003.3361839462.0000000005998000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189. |
Source: ea17d0b77a.exe, 0000002F.00000003.3361781382.0000000005992000.00000004.00000800.00020000.00000000.sdmp, ea17d0b77a.exe, 0000002F.00000003.3361839462.0000000005998000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&cta |
Source: ea17d0b77a.exe, 0000002F.00000003.3289351345.00000000059CB000.00000004.00000800.00020000.00000000.sdmp, ea17d0b77a.exe, 0000002F.00000003.3288988344.00000000059CE000.00000004.00000800.00020000.00000000.sdmp, ea17d0b77a.exe, 0000002F.00000003.3289219383.00000000059CB000.00000004.00000800.00020000.00000000.sdmp, 9434b989db.exe, 00000030.00000003.3524665677.0000000000827000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q= |
Source: ea17d0b77a.exe, 0000002F.00000003.3289351345.00000000059CB000.00000004.00000800.00020000.00000000.sdmp, ea17d0b77a.exe, 0000002F.00000003.3288988344.00000000059CE000.00000004.00000800.00020000.00000000.sdmp, ea17d0b77a.exe, 0000002F.00000003.3289219383.00000000059CB000.00000004.00000800.00020000.00000000.sdmp, 9434b989db.exe, 00000030.00000003.3524665677.0000000000827000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search |
Source: ea17d0b77a.exe, 0000002F.00000003.3289351345.00000000059CB000.00000004.00000800.00020000.00000000.sdmp, ea17d0b77a.exe, 0000002F.00000003.3288988344.00000000059CE000.00000004.00000800.00020000.00000000.sdmp, ea17d0b77a.exe, 0000002F.00000003.3289219383.00000000059CB000.00000004.00000800.00020000.00000000.sdmp, 9434b989db.exe, 00000030.00000003.3524665677.0000000000827000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command= |
Source: ea17d0b77a.exe, 0000002F.00000003.3361781382.0000000005992000.00000004.00000800.00020000.00000000.sdmp, ea17d0b77a.exe, 0000002F.00000003.3361839462.0000000005998000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg |
Source: ea17d0b77a.exe, 0000002F.00000003.3361781382.0000000005992000.00000004.00000800.00020000.00000000.sdmp, ea17d0b77a.exe, 0000002F.00000003.3361839462.0000000005998000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg |
Source: 352def4414.exe, 0000002D.00000003.3055975665.0000000007180000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://curl.se/docs/alt-svc.html |
Source: 352def4414.exe, 0000002D.00000003.3055975665.0000000007180000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://curl.se/docs/hsts.html |
Source: 352def4414.exe, 0000002D.00000003.3055975665.0000000007180000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://curl.se/docs/http-cookies.html |
Source: ea17d0b77a.exe, 0000002F.00000003.3355323768.0000000005987000.00000004.00000800.00020000.00000000.sdmp, ea17d0b77a.exe, 0000002F.00000003.3356315250.0000000005999000.00000004.00000800.00020000.00000000.sdmp, ea17d0b77a.exe, 0000002F.00000003.3361781382.0000000005992000.00000004.00000800.00020000.00000000.sdmp, ea17d0b77a.exe, 0000002F.00000003.3387431025.000000000599A000.00000004.00000800.00020000.00000000.sdmp, ea17d0b77a.exe, 0000002F.00000003.3538247582.000000000599D000.00000004.00000800.00020000.00000000.sdmp, ea17d0b77a.exe, 0000002F.00000003.3361839462.0000000005998000.00000004.00000800.00020000.00000000.sdmp, ea17d0b77a.exe, 0000002F.00000003.3537566773.00000000010F6000.00000004.00000020.00020000.00000000.sdmp, ea17d0b77a.exe, 0000002F.00000003.3355441716.000000000598F000.00000004.00000800.00020000.00000000.sdmp, ea17d0b77a.exe, 0000002F.00000003.3355493240.0000000005997000.00000004.00000800.00020000.00000000.sdmp, ea17d0b77a.exe, 0000002F.00000003.3504377940.000000000599C000.00000004.00000800.00020000.00000000.sdmp, ea17d0b77a.exe, 0000002F.00000003.3533335417.0000000005992000.00000004.00000800.00020000.00000000.sdmp, ea17d0b77a.exe, 0000002F.00000003.3504078369.0000000005990000.00000004.00000800.00020000.00000000.sdmp, ea17d0b77a.exe, 0000002F.00000003.3539294349.0000000001072000.00000004.00000020.00020000.00000000.sdmp, ea17d0b77a.exe, 0000002F.00000003.3471828382.00000000010F6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://discokeyus.lat/ |
Source: ea17d0b77a.exe, 0000002F.00000003.3539294349.0000000001072000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://discokeyus.lat/=G |
Source: ea17d0b77a.exe, 0000002F.00000003.3387431025.000000000599A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://discokeyus.lat/P |
Source: ea17d0b77a.exe, 0000002F.00000003.3474594016.0000000005990000.00000004.00000800.00020000.00000000.sdmp, ea17d0b77a.exe, 0000002F.00000003.3421003760.000000000598C000.00000004.00000800.00020000.00000000.sdmp, ea17d0b77a.exe, 0000002F.00000003.3355323768.0000000005987000.00000004.00000800.00020000.00000000.sdmp, ea17d0b77a.exe, 0000002F.00000003.3539294349.000000000108C000.00000004.00000020.00020000.00000000.sdmp, ea17d0b77a.exe, 0000002F.00000003.3361781382.0000000005992000.00000004.00000800.00020000.00000000.sdmp, ea17d0b77a.exe, 0000002F.00000003.3387431025.000000000599A000.00000004.00000800.00020000.00000000.sdmp, ea17d0b77a.exe, 0000002F.00000003.3387431025.000000000598C000.00000004.00000800.00020000.00000000.sdmp, ea17d0b77a.exe, 0000002F.00000003.3355441716.000000000598F000.00000004.00000800.00020000.00000000.sdmp, ea17d0b77a.exe, 0000002F.00000003.3504377940.000000000599C000.00000004.00000800.00020000.00000000.sdmp, ea17d0b77a.exe, 0000002F.00000003.3464019441.000000000598C000.00000004.00000800.00020000.00000000.sdmp, ea17d0b77a.exe, 0000002F.00000003.3464019441.0000000005990000.00000004.00000800.00020000.00000000.sdmp, ea17d0b77a.exe, 0000002F.00000003.3474594016.0000000005989000.00000004.00000800.00020000.00000000.sdmp, ea17d0b77a.exe, 0000002F.00000003.3421454526.000000000598F000.00000004.00000800.00020000.00000000.sdmp, ea17d0b77a.exe, 0000002F.00000003.3504078369.0000000005990000.00000004.00000800.00020000.00000000.sdmp, ea17d0b77a.exe, 0000002F.00000003.3314582270.0000000005989000.00000004.00000800.00020000.00000000.sdmp, ea17d0b77a.exe, 0000002F.00000003.3533335417.000000000598C000.00000004.00000800.00020000.00000000.sdmp, ea17d0b77a.exe, 0000002F.00000003.3390597746.000000000598F000.00000004.00000800.00020000.00000000.sdmp, ea17d0b77a.exe, 0000002F.00000003.3358345765.0000000005992000.00000004.00000800.00020000.00000000.sdmp, ea17d0b77a.exe, 0000002F.00000003.3422664576.0000000005996000.00000004.00000800.00020000.00000000.sdmp, ea17d0b77a.exe, 0000002F.00000003.3537566773.0000000001108000.00000004.00000020.00020000.00000000.sdmp, ea17d0b77a.exe, 0000002F.00000003.3396433955.0000000005992000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://discokeyus.lat/api |
Source: ea17d0b77a.exe, 0000002F.00000003.3355323768.0000000005987000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://discokeyus.lat/apiqqqqqq |
Source: ea17d0b77a.exe, 0000002F.00000003.3537566773.00000000010F6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://discokeyus.lat/jBpk9 |
Source: ea17d0b77a.exe, 0000002F.00000003.3475247118.00000000010E8000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://discokeyus.lat:443/api |
Source: ea17d0b77a.exe, 0000002F.00000003.3289351345.00000000059CB000.00000004.00000800.00020000.00000000.sdmp, ea17d0b77a.exe, 0000002F.00000003.3288988344.00000000059CE000.00000004.00000800.00020000.00000000.sdmp, ea17d0b77a.exe, 0000002F.00000003.3289219383.00000000059CB000.00000004.00000800.00020000.00000000.sdmp, 9434b989db.exe, 00000030.00000003.3524665677.0000000000827000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/ac/?q= |
Source: ea17d0b77a.exe, 0000002F.00000003.3289351345.00000000059CB000.00000004.00000800.00020000.00000000.sdmp, ea17d0b77a.exe, 0000002F.00000003.3288988344.00000000059CE000.00000004.00000800.00020000.00000000.sdmp, ea17d0b77a.exe, 0000002F.00000003.3289219383.00000000059CB000.00000004.00000800.00020000.00000000.sdmp, 9434b989db.exe, 00000030.00000003.3524665677.0000000000827000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/chrome_newtab |
Source: ea17d0b77a.exe, 0000002F.00000003.3289351345.00000000059CB000.00000004.00000800.00020000.00000000.sdmp, ea17d0b77a.exe, 0000002F.00000003.3288988344.00000000059CE000.00000004.00000800.00020000.00000000.sdmp, ea17d0b77a.exe, 0000002F.00000003.3289219383.00000000059CB000.00000004.00000800.00020000.00000000.sdmp, 9434b989db.exe, 00000030.00000003.3524665677.0000000000827000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q= |
Source: d5cd5e4aa8.exe, 0000002E.00000003.3864248822.000000000585D000.00000004.00000020.00020000.00000000.sdmp, d5cd5e4aa8.exe, 0000002E.00000003.3868146778.000000000595F000.00000004.00000020.00020000.00000000.sdmp, d5cd5e4aa8.exe, 0000002E.00000003.3864248822.000000000595C000.00000004.00000020.00020000.00000000.sdmp, d5cd5e4aa8.exe, 0000002E.00000003.3868658111.00000000059A2000.00000004.00000020.00020000.00000000.sdmp, d5cd5e4aa8.exe, 0000002E.00000003.3869728348.000000000595F000.00000004.00000020.00020000.00000000.sdmp, d5cd5e4aa8.exe, 0000002E.00000003.3863773219.000000000569F000.00000004.00000020.00020000.00000000.sdmp, d5cd5e4aa8.exe, 0000002E.00000003.3869516834.0000000005A31000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://g-cleanit.hk |
Source: 352def4414.exe, 0000002D.00000003.3055975665.0000000007180000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://httpbin.org/ip |
Source: 352def4414.exe, 0000002D.00000003.3055975665.0000000007180000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://httpbin.org/ipbefore |
Source: ea17d0b77a.exe, 0000002F.00000003.3361839462.0000000005998000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi |
Source: d5cd5e4aa8.exe, 0000002E.00000003.3864248822.000000000585D000.00000004.00000020.00020000.00000000.sdmp, d5cd5e4aa8.exe, 0000002E.00000003.3868146778.000000000595F000.00000004.00000020.00020000.00000000.sdmp, d5cd5e4aa8.exe, 0000002E.00000003.3864248822.000000000595C000.00000004.00000020.00020000.00000000.sdmp, d5cd5e4aa8.exe, 0000002E.00000003.3868658111.00000000059A2000.00000004.00000020.00020000.00000000.sdmp, d5cd5e4aa8.exe, 0000002E.00000003.3869728348.000000000595F000.00000004.00000020.00020000.00000000.sdmp, d5cd5e4aa8.exe, 0000002E.00000003.3863773219.000000000569F000.00000004.00000020.00020000.00000000.sdmp, d5cd5e4aa8.exe, 0000002E.00000003.3869516834.0000000005A31000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://iplogger.org/1Pz8p7 |
Source: c359af6492.exe.14.dr | String found in binary or memory: https://sectigo.com/CPS0 |
Source: 9434b989db.exe, 00000030.00000003.4037665707.000000000B7A8000.00000004.00000020.00020000.00000000.sdmp, 9434b989db.exe, 00000030.00000002.4222202528.0000000001087000.00000040.00000001.01000000.00000013.sdmp | String found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br |
Source: ea17d0b77a.exe, 0000002F.00000003.3358748084.0000000005AAC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.mozilla.org/products/firefoxgro.all |
Source: 9434b989db.exe, 00000030.00000003.4037665707.000000000B7A8000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://support.mozilla.org/products/firefoxgro.allizom.troppus.ZAnPVwXvBbYt |
Source: ea17d0b77a.exe, 0000002F.00000003.3361781382.0000000005992000.00000004.00000800.00020000.00000000.sdmp, ea17d0b77a.exe, 0000002F.00000003.3361839462.0000000005998000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_86277c656a4bd7d619968160e91c45fd066919bb3bd119b3 |
Source: ea17d0b77a.exe, 0000002F.00000003.3289351345.00000000059CB000.00000004.00000800.00020000.00000000.sdmp, ea17d0b77a.exe, 0000002F.00000003.3288988344.00000000059CE000.00000004.00000800.00020000.00000000.sdmp, ea17d0b77a.exe, 0000002F.00000003.3289219383.00000000059CB000.00000004.00000800.00020000.00000000.sdmp, 9434b989db.exe, 00000030.00000003.3524665677.0000000000827000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.ecosia.org/newtab/ |
Source: ea17d0b77a.exe, 0000002F.00000003.3289351345.00000000059CB000.00000004.00000800.00020000.00000000.sdmp, ea17d0b77a.exe, 0000002F.00000003.3288988344.00000000059CE000.00000004.00000800.00020000.00000000.sdmp, ea17d0b77a.exe, 0000002F.00000003.3289219383.00000000059CB000.00000004.00000800.00020000.00000000.sdmp, 9434b989db.exe, 00000030.00000003.3524665677.0000000000827000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico |
Source: ea17d0b77a.exe, 0000002F.00000003.3358203921.00000000059B8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.or |
Source: ea17d0b77a.exe, 0000002F.00000003.3358203921.00000000059B8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org |
Source: 9434b989db.exe, 00000030.00000002.4222202528.0000000000FA4000.00000040.00000001.01000000.00000013.sdmp, 9434b989db.exe, 00000030.00000002.4222202528.0000000001087000.00000040.00000001.01000000.00000013.sdmp | String found in binary or memory: https://www.mozilla.org/about/ |
Source: 9434b989db.exe, 00000030.00000002.4222202528.0000000001087000.00000040.00000001.01000000.00000013.sdmp | String found in binary or memory: https://www.mozilla.org/about/AFIJJJJKJDHD |
Source: 9434b989db.exe, 00000030.00000003.4037665707.000000000B7A8000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.bwSC1pmG_zle |
Source: 9434b989db.exe, 00000030.00000002.4222202528.0000000000FA4000.00000040.00000001.01000000.00000013.sdmp, 9434b989db.exe, 00000030.00000002.4222202528.0000000001087000.00000040.00000001.01000000.00000013.sdmp | String found in binary or memory: https://www.mozilla.org/contribute/ |
Source: 9434b989db.exe, 00000030.00000002.4222202528.0000000001087000.00000040.00000001.01000000.00000013.sdmp | String found in binary or memory: https://www.mozilla.org/contribute/W1sYnpxLnB3ZA== |
Source: 9434b989db.exe, 00000030.00000003.4037665707.000000000B7A8000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.hjKdHaZH-dbQ |
Source: 9434b989db.exe, 00000030.00000002.4222202528.0000000001087000.00000040.00000001.01000000.00000013.sdmp | String found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig |
Source: ea17d0b77a.exe, 0000002F.00000003.3361781382.0000000005992000.00000004.00000800.00020000.00000000.sdmp, ea17d0b77a.exe, 0000002F.00000003.3361839462.0000000005998000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_ |
Source: Intel_PTT_EK_Recertification.exe, 00000027.00000003.3021212700.000002804F500000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000028.00000002.3027829379.00000001402DD000.00000002.00000001.00020000.00000000.sdmp | String found in binary or memory: https://xmrig.com/docs/algorithms |
Source: Intel_PTT_EK_Recertification.exe, 00000027.00000003.3021212700.000002804F500000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000028.00000002.3027829379.00000001402DD000.00000002.00000001.00020000.00000000.sdmp | String found in binary or memory: https://xmrig.com/wizard |
Source: Intel_PTT_EK_Recertification.exe, 00000027.00000003.3021212700.000002804F500000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000028.00000002.3027829379.00000001402DD000.00000002.00000001.00020000.00000000.sdmp | String found in binary or memory: https://xmrig.com/wizard%s |
Source: C:\Users\user\Desktop\file.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: mstask.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: dui70.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: duser.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: chartv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: onecoreuapcommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: oleacc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: atlthunk.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: textinputframework.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: coreuicomponents.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: wtsapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: winsta.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: textshaping.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: windows.staterepositoryps.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: windows.fileexplorer.common.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: explorerframe.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: edputil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: appresolver.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: bcp47langs.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: slc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: onecorecommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: edputil.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: windows.staterepositoryps.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: appresolver.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: bcp47langs.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: slc.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: onecorecommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: onecoreuapcommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1018743001\c359af6492.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1018743001\c359af6492.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1018743001\c359af6492.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1018743001\c359af6492.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1018743001\c359af6492.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1018743001\c359af6492.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1018743001\c359af6492.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1018743001\c359af6492.exe | Section loaded: edputil.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1018743001\c359af6492.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1018743001\c359af6492.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1018743001\c359af6492.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1018743001\c359af6492.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1018743001\c359af6492.exe | Section loaded: windows.staterepositoryps.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1018743001\c359af6492.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1018743001\c359af6492.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1018743001\c359af6492.exe | Section loaded: appresolver.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1018743001\c359af6492.exe | Section loaded: bcp47langs.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1018743001\c359af6492.exe | Section loaded: slc.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1018743001\c359af6492.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1018743001\c359af6492.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1018743001\c359af6492.exe | Section loaded: onecorecommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1018743001\c359af6492.exe | Section loaded: onecoreuapcommonproxystub.dll | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Section loaded: cmdext.dll | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Windows\System32\mode.com | Section loaded: ulib.dll | Jump to behavior |
Source: C:\Windows\System32\mode.com | Section loaded: ureg.dll | Jump to behavior |
Source: C:\Windows\System32\mode.com | Section loaded: fsutilext.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\main\7z.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\main\7z.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\main\7z.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\main\7z.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\main\7z.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\main\7z.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\main\7z.exe | Section loaded: cryptbase.dll | |
Source: C:\Users\user\AppData\Local\Temp\main\7z.exe | Section loaded: cryptbase.dll | |
Source: C:\Windows\System32\attrib.exe | Section loaded: ulib.dll | |
Source: C:\Windows\System32\attrib.exe | Section loaded: fsutilext.dll | |
Source: C:\Users\user\AppData\Local\Temp\main\in.exe | Section loaded: apphelp.dll | |
Source: C:\Users\user\AppData\Local\Temp\main\in.exe | Section loaded: windows.storage.dll | |
Source: C:\Users\user\AppData\Local\Temp\main\in.exe | Section loaded: wldp.dll | |
Source: C:\Users\user\AppData\Local\Temp\main\in.exe | Section loaded: ntmarta.dll | |
Source: C:\Windows\System32\attrib.exe | Section loaded: ulib.dll | |
Source: C:\Windows\System32\attrib.exe | Section loaded: fsutilext.dll | |
Source: C:\Windows\System32\attrib.exe | Section loaded: ulib.dll | |
Source: C:\Windows\System32\attrib.exe | Section loaded: fsutilext.dll | |
Source: C:\Windows\System32\schtasks.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Windows\System32\schtasks.exe | Section loaded: taskschd.dll | |
Source: C:\Windows\System32\schtasks.exe | Section loaded: sspicli.dll | |
Source: C:\Windows\System32\schtasks.exe | Section loaded: xmllite.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: atl.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mscoree.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: version.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: vcruntime140_clr0400.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptsp.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: rsaenh.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptbase.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: amsi.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: userenv.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: profapi.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: windows.storage.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wldp.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msasn1.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: gpapi.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msisip.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wshext.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: appxsip.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: opcservices.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: secur32.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: sspicli.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: uxtheme.dll | |
Source: C:\Windows\System32\PING.EXE | Section loaded: iphlpapi.dll | |
Source: C:\Windows\System32\PING.EXE | Section loaded: winnsi.dll | |
Source: C:\Windows\System32\PING.EXE | Section loaded: mswsock.dll | |
Source: C:\Users\user\AppData\Roaming\Intel_PTT_EK_Recertification.exe | Section loaded: apphelp.dll | |
Source: C:\Windows\explorer.exe | Section loaded: iphlpapi.dll | |
Source: C:\Windows\explorer.exe | Section loaded: userenv.dll | |
Source: C:\Windows\explorer.exe | Section loaded: msvcp140.dll | |
Source: C:\Windows\explorer.exe | Section loaded: vcruntime140.dll | |
Source: C:\Windows\explorer.exe | Section loaded: vcruntime140_1.dll | |
Source: C:\Windows\explorer.exe | Section loaded: cryptbase.dll | |
Source: C:\Windows\explorer.exe | Section loaded: wininet.dll | |
Source: C:\Windows\explorer.exe | Section loaded: powrprof.dll | |
Source: C:\Windows\explorer.exe | Section loaded: umpdc.dll | |
Source: C:\Windows\explorer.exe | Section loaded: uxtheme.dll | |
Source: C:\Windows\explorer.exe | Section loaded: mswsock.dll | |
Source: C:\Windows\explorer.exe | Section loaded: dhcpcsvc6.dll | |
Source: C:\Windows\explorer.exe | Section loaded: dhcpcsvc.dll | |
Source: C:\Windows\explorer.exe | Section loaded: dnsapi.dll | |
Source: C:\Windows\explorer.exe | Section loaded: napinsp.dll | |
Source: C:\Windows\explorer.exe | Section loaded: pnrpnsp.dll | |
Source: C:\Windows\explorer.exe | Section loaded: wshbth.dll | |
Source: C:\Windows\explorer.exe | Section loaded: nlaapi.dll | |
Source: C:\Windows\explorer.exe | Section loaded: winrnr.dll | |
Source: C:\Windows\explorer.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Windows\explorer.exe | Section loaded: explorerframe.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: atl.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mscoree.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: version.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: vcruntime140_clr0400.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptsp.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: rsaenh.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptbase.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: windows.storage.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wldp.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msasn1.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: amsi.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: userenv.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: profapi.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: gpapi.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msisip.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wshext.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: appxsip.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: opcservices.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: secur32.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: sspicli.dll | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: uxtheme.dll | |
Source: C:\Windows\System32\PING.EXE | Section loaded: iphlpapi.dll | |
Source: C:\Windows\System32\PING.EXE | Section loaded: winnsi.dll | |
Source: C:\Windows\System32\PING.EXE | Section loaded: mswsock.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018747001\352def4414.exe | Section loaded: apphelp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018747001\352def4414.exe | Section loaded: winmm.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018747001\352def4414.exe | Section loaded: iphlpapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018747001\352def4414.exe | Section loaded: cryptbase.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018747001\352def4414.exe | Section loaded: cryptsp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018747001\352def4414.exe | Section loaded: rsaenh.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018747001\352def4414.exe | Section loaded: dhcpcsvc6.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018747001\352def4414.exe | Section loaded: dhcpcsvc.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018747001\352def4414.exe | Section loaded: dnsapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018747001\352def4414.exe | Section loaded: napinsp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018747001\352def4414.exe | Section loaded: pnrpnsp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018747001\352def4414.exe | Section loaded: wshbth.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018747001\352def4414.exe | Section loaded: nlaapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018747001\352def4414.exe | Section loaded: mswsock.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018747001\352def4414.exe | Section loaded: winrnr.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018747001\352def4414.exe | Section loaded: uxtheme.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018747001\352def4414.exe | Section loaded: windows.storage.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018747001\352def4414.exe | Section loaded: wldp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018747001\352def4414.exe | Section loaded: windowscodecs.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018747001\352def4414.exe | Section loaded: napinsp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018747001\352def4414.exe | Section loaded: pnrpnsp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018747001\352def4414.exe | Section loaded: wshbth.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018747001\352def4414.exe | Section loaded: nlaapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018747001\352def4414.exe | Section loaded: winrnr.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018747001\352def4414.exe | Section loaded: sspicli.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018747001\352def4414.exe | Section loaded: dpapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018747001\352def4414.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018747001\352def4414.exe | Section loaded: propsys.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018747001\352def4414.exe | Section loaded: dlnashext.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018747001\352def4414.exe | Section loaded: wpdshext.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018747001\352def4414.exe | Section loaded: profapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018747001\352def4414.exe | Section loaded: edputil.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018747001\352def4414.exe | Section loaded: urlmon.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018747001\352def4414.exe | Section loaded: iertutil.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018747001\352def4414.exe | Section loaded: srvcli.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018747001\352def4414.exe | Section loaded: netutils.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018747001\352def4414.exe | Section loaded: windows.staterepositoryps.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018747001\352def4414.exe | Section loaded: wintypes.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018747001\352def4414.exe | Section loaded: appresolver.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018747001\352def4414.exe | Section loaded: bcp47langs.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018747001\352def4414.exe | Section loaded: slc.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018747001\352def4414.exe | Section loaded: userenv.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018747001\352def4414.exe | Section loaded: sppc.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018747001\352def4414.exe | Section loaded: onecorecommonproxystub.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018747001\352def4414.exe | Section loaded: onecoreuapcommonproxystub.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018748001\d5cd5e4aa8.exe | Section loaded: apphelp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018748001\d5cd5e4aa8.exe | Section loaded: winmm.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018748001\d5cd5e4aa8.exe | Section loaded: msimg32.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018748001\d5cd5e4aa8.exe | Section loaded: wininet.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018748001\d5cd5e4aa8.exe | Section loaded: msvcr100.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018748001\d5cd5e4aa8.exe | Section loaded: iertutil.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018748001\d5cd5e4aa8.exe | Section loaded: sspicli.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018748001\d5cd5e4aa8.exe | Section loaded: windows.storage.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018748001\d5cd5e4aa8.exe | Section loaded: wldp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018748001\d5cd5e4aa8.exe | Section loaded: profapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018748001\d5cd5e4aa8.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018748001\d5cd5e4aa8.exe | Section loaded: ondemandconnroutehelper.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018748001\d5cd5e4aa8.exe | Section loaded: winhttp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018748001\d5cd5e4aa8.exe | Section loaded: mswsock.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018748001\d5cd5e4aa8.exe | Section loaded: iphlpapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018748001\d5cd5e4aa8.exe | Section loaded: winnsi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018748001\d5cd5e4aa8.exe | Section loaded: urlmon.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018748001\d5cd5e4aa8.exe | Section loaded: srvcli.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018748001\d5cd5e4aa8.exe | Section loaded: netutils.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018748001\d5cd5e4aa8.exe | Section loaded: cryptsp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018748001\d5cd5e4aa8.exe | Section loaded: rsaenh.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018748001\d5cd5e4aa8.exe | Section loaded: cryptbase.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018748001\d5cd5e4aa8.exe | Section loaded: uxtheme.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018748001\d5cd5e4aa8.exe | Section loaded: propsys.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018748001\d5cd5e4aa8.exe | Section loaded: linkinfo.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018748001\d5cd5e4aa8.exe | Section loaded: ntshrui.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018748001\d5cd5e4aa8.exe | Section loaded: cscapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018749001\ea17d0b77a.exe | Section loaded: apphelp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018749001\ea17d0b77a.exe | Section loaded: winmm.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018749001\ea17d0b77a.exe | Section loaded: windows.storage.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018749001\ea17d0b77a.exe | Section loaded: wldp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018749001\ea17d0b77a.exe | Section loaded: winhttp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018749001\ea17d0b77a.exe | Section loaded: ondemandconnroutehelper.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018749001\ea17d0b77a.exe | Section loaded: webio.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018749001\ea17d0b77a.exe | Section loaded: mswsock.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018749001\ea17d0b77a.exe | Section loaded: iphlpapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018749001\ea17d0b77a.exe | Section loaded: winnsi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018749001\ea17d0b77a.exe | Section loaded: sspicli.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018749001\ea17d0b77a.exe | Section loaded: dnsapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018749001\ea17d0b77a.exe | Section loaded: rasadhlp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018749001\ea17d0b77a.exe | Section loaded: ondemandconnroutehelper.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018749001\ea17d0b77a.exe | Section loaded: fwpuclnt.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018749001\ea17d0b77a.exe | Section loaded: schannel.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018749001\ea17d0b77a.exe | Section loaded: mskeyprotect.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018749001\ea17d0b77a.exe | Section loaded: ntasn1.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018749001\ea17d0b77a.exe | Section loaded: ncrypt.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018749001\ea17d0b77a.exe | Section loaded: ncryptsslp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018749001\ea17d0b77a.exe | Section loaded: msasn1.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018749001\ea17d0b77a.exe | Section loaded: cryptsp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018749001\ea17d0b77a.exe | Section loaded: rsaenh.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018749001\ea17d0b77a.exe | Section loaded: cryptbase.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018749001\ea17d0b77a.exe | Section loaded: gpapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018749001\ea17d0b77a.exe | Section loaded: dpapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018749001\ea17d0b77a.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018749001\ea17d0b77a.exe | Section loaded: uxtheme.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018749001\ea17d0b77a.exe | Section loaded: ondemandconnroutehelper.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018749001\ea17d0b77a.exe | Section loaded: wbemcomn.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018749001\ea17d0b77a.exe | Section loaded: amsi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018749001\ea17d0b77a.exe | Section loaded: userenv.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018749001\ea17d0b77a.exe | Section loaded: profapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018749001\ea17d0b77a.exe | Section loaded: version.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018749001\ea17d0b77a.exe | Section loaded: ondemandconnroutehelper.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018749001\ea17d0b77a.exe | Section loaded: ondemandconnroutehelper.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018749001\ea17d0b77a.exe | Section loaded: ondemandconnroutehelper.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018749001\ea17d0b77a.exe | Section loaded: ondemandconnroutehelper.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018749001\ea17d0b77a.exe | Section loaded: ondemandconnroutehelper.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018749001\ea17d0b77a.exe | Section loaded: ondemandconnroutehelper.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018749001\ea17d0b77a.exe | Section loaded: ondemandconnroutehelper.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018750001\9434b989db.exe | Section loaded: apphelp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018750001\9434b989db.exe | Section loaded: winmm.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018750001\9434b989db.exe | Section loaded: sspicli.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018750001\9434b989db.exe | Section loaded: wininet.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018750001\9434b989db.exe | Section loaded: rstrtmgr.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018750001\9434b989db.exe | Section loaded: ncrypt.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018750001\9434b989db.exe | Section loaded: ntasn1.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018750001\9434b989db.exe | Section loaded: iertutil.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018750001\9434b989db.exe | Section loaded: windows.storage.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018750001\9434b989db.exe | Section loaded: wldp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018750001\9434b989db.exe | Section loaded: profapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018750001\9434b989db.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018750001\9434b989db.exe | Section loaded: ondemandconnroutehelper.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018750001\9434b989db.exe | Section loaded: winhttp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018750001\9434b989db.exe | Section loaded: mswsock.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018750001\9434b989db.exe | Section loaded: iphlpapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018750001\9434b989db.exe | Section loaded: winnsi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018750001\9434b989db.exe | Section loaded: urlmon.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018750001\9434b989db.exe | Section loaded: srvcli.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018750001\9434b989db.exe | Section loaded: netutils.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018750001\9434b989db.exe | Section loaded: dpapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018750001\9434b989db.exe | Section loaded: cryptbase.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018750001\9434b989db.exe | Section loaded: dnsapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018750001\9434b989db.exe | Section loaded: fwpuclnt.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018750001\9434b989db.exe | Section loaded: rasadhlp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018750001\9434b989db.exe | Section loaded: ntmarta.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018750001\9434b989db.exe | Section loaded: mozglue.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018750001\9434b989db.exe | Section loaded: wsock32.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018750001\9434b989db.exe | Section loaded: vcruntime140.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018750001\9434b989db.exe | Section loaded: msvcp140.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018750001\9434b989db.exe | Section loaded: vcruntime140.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018750001\9434b989db.exe | Section loaded: uxtheme.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018750001\9434b989db.exe | Section loaded: propsys.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018750001\9434b989db.exe | Section loaded: edputil.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018750001\9434b989db.exe | Section loaded: windows.staterepositoryps.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018750001\9434b989db.exe | Section loaded: wintypes.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018750001\9434b989db.exe | Section loaded: appresolver.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018750001\9434b989db.exe | Section loaded: bcp47langs.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018750001\9434b989db.exe | Section loaded: slc.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018750001\9434b989db.exe | Section loaded: userenv.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018750001\9434b989db.exe | Section loaded: sppc.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018750001\9434b989db.exe | Section loaded: onecorecommonproxystub.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018750001\9434b989db.exe | Section loaded: onecoreuapcommonproxystub.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018750001\9434b989db.exe | Section loaded: pcacli.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018750001\9434b989db.exe | Section loaded: mpr.dll | |
Source: C:\Users\user\AppData\Local\Temp\1018750001\9434b989db.exe | Section loaded: sfc_os.dll | |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1018743001\c359af6492.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\explorer.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\conhost.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1018747001\352def4414.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1018747001\352def4414.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1018749001\ea17d0b77a.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1018750001\9434b989db.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D17D17 second address: D17D2C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push esi 0x00000006 pushad 0x00000007 jnp 00007F6969412EA6h 0x0000000d jnp 00007F6969412EA6h 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D17E95 second address: D17EB6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jmp 00007F6968D54749h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D17EB6 second address: D17EC2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jbe 00007F6969412EA6h 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D17EC2 second address: D17EC6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D17EC6 second address: D17EEB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007F6969412EB5h 0x0000000f jg 00007F6969412EA6h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D1B2E9 second address: D1B2EF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D1B2EF second address: D1B2F9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jno 00007F6969412EA6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D1B44C second address: D1B452 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D1B452 second address: D1B480 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 mov eax, dword ptr [esp+04h] 0x0000000a jg 00007F6969412EB3h 0x00000010 mov eax, dword ptr [eax] 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007F6969412EADh 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D1B480 second address: D1B49A instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push edi 0x00000004 pop edi 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp+04h], eax 0x0000000c push eax 0x0000000d push edx 0x0000000e je 00007F6968D5473Ch 0x00000014 jnl 00007F6968D54736h 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D1B49A second address: D1B4D6 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 jbe 00007F6969412EA6h 0x00000009 pop edx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pop eax 0x0000000d call 00007F6969412EADh 0x00000012 xor cx, BEC6h 0x00000017 pop edi 0x00000018 lea ebx, dword ptr [ebp+1246025Ch] 0x0000001e mov edx, dword ptr [ebp+122D2CE3h] 0x00000024 xchg eax, ebx 0x00000025 push eax 0x00000026 push edx 0x00000027 jmp 00007F6969412EADh 0x0000002c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D1B594 second address: D1B5AF instructions: 0x00000000 rdtsc 0x00000002 jns 00007F6968D54738h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jno 00007F6968D5473Ch 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D1B5AF second address: D1B5B9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jno 00007F6969412EA6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D1B5B9 second address: D1B649 instructions: 0x00000000 rdtsc 0x00000002 je 00007F6968D54736h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c nop 0x0000000d mov edi, dword ptr [ebp+122D2F3Bh] 0x00000013 mov dword ptr [ebp+122D30EAh], esi 0x00000019 push 00000000h 0x0000001b adc di, 81FBh 0x00000020 mov dword ptr [ebp+122D31B5h], eax 0x00000026 push 75611D31h 0x0000002b push ecx 0x0000002c pushad 0x0000002d pushad 0x0000002e popad 0x0000002f jno 00007F6968D54736h 0x00000035 popad 0x00000036 pop ecx 0x00000037 xor dword ptr [esp], 75611DB1h 0x0000003e mov edx, dword ptr [ebp+122D2DD3h] 0x00000044 push 00000003h 0x00000046 push 00000000h 0x00000048 mov esi, eax 0x0000004a push 00000003h 0x0000004c mov edi, dword ptr [ebp+122D2F67h] 0x00000052 call 00007F6968D54739h 0x00000057 je 00007F6968D5474Eh 0x0000005d jng 00007F6968D54748h 0x00000063 jmp 00007F6968D54742h 0x00000068 push eax 0x00000069 pushad 0x0000006a push eax 0x0000006b push edx 0x0000006c jmp 00007F6968D54743h 0x00000071 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D1B649 second address: D1B666 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F6969412EA6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b pushad 0x0000000c popad 0x0000000d jng 00007F6969412EA6h 0x00000013 popad 0x00000014 popad 0x00000015 mov eax, dword ptr [esp+04h] 0x00000019 pushad 0x0000001a pushad 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D1B666 second address: D1B66C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D1B66C second address: D1B69E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007F6969412EB5h 0x0000000a popad 0x0000000b mov eax, dword ptr [eax] 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007F6969412EB1h 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D1B69E second address: D1B6A4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D1B6A4 second address: D1B6AE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jns 00007F6969412EA6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D1B6AE second address: D1B6B2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D1B791 second address: D1B796 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D1B796 second address: D1B7E8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F6968D54749h 0x00000008 push eax 0x00000009 pop eax 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e jo 00007F6968D5474Eh 0x00000014 push ebx 0x00000015 jmp 00007F6968D54746h 0x0000001a pop ebx 0x0000001b mov eax, dword ptr [esp+04h] 0x0000001f push eax 0x00000020 push edx 0x00000021 jp 00007F6968D5473Ch 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D1B7E8 second address: D1B82A instructions: 0x00000000 rdtsc 0x00000002 jne 00007F6969412EBFh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov eax, dword ptr [eax] 0x0000000c push eax 0x0000000d push edx 0x0000000e push esi 0x0000000f jmp 00007F6969412EB9h 0x00000014 pop esi 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D1B8D7 second address: D1B8DC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D1B8DC second address: D1B917 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 add dword ptr [esp], 1B0E06AAh 0x00000010 mov ecx, ebx 0x00000012 lea ebx, dword ptr [ebp+12460270h] 0x00000018 push esi 0x00000019 movzx edx, bx 0x0000001c pop esi 0x0000001d xchg eax, ebx 0x0000001e push esi 0x0000001f jl 00007F6969412EACh 0x00000025 pop esi 0x00000026 push eax 0x00000027 push eax 0x00000028 push edx 0x00000029 jbe 00007F6969412EACh 0x0000002f jl 00007F6969412EA6h 0x00000035 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D2C54F second address: D2C558 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D2C558 second address: D2C55C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D2C55C second address: D2C575 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6968D5473Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c jnp 00007F6968D5473Ch 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D3C56A second address: D3C57F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pushad 0x00000006 jp 00007F6969412EA6h 0x0000000c jp 00007F6969412EA6h 0x00000012 push esi 0x00000013 pop esi 0x00000014 popad 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D3C57F second address: D3C587 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D3C587 second address: D3C59C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push ebx 0x0000000b push eax 0x0000000c push edx 0x0000000d js 00007F6969412EA6h 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D3C59C second address: D3C5A0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CFCA68 second address: CFCA6C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D3A447 second address: D3A44B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D3A58C second address: D3A590 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D3A590 second address: D3A59D instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pushad 0x00000004 popad 0x00000005 push edx 0x00000006 pop edx 0x00000007 pop edi 0x00000008 pushad 0x00000009 push edi 0x0000000a pop edi 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D3A59D second address: D3A5A3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D3A7F4 second address: D3A819 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6968D54741h 0x00000007 jnp 00007F6968D54736h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f js 00007F6968D5473Eh 0x00000015 push ecx 0x00000016 pop ecx 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D3A819 second address: D3A837 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 jmp 00007F6969412EB8h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D3A976 second address: D3A99A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 ja 00007F6968D54748h 0x0000000c pop edi 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D3A99A second address: D3A9B7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jo 00007F6969412EA6h 0x0000000a pushad 0x0000000b popad 0x0000000c popad 0x0000000d pushad 0x0000000e pushad 0x0000000f popad 0x00000010 jmp 00007F6969412EABh 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D3A9B7 second address: D3A9BC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D3A9BC second address: D3A9D5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6969412EB4h 0x00000007 push edi 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D3ADD3 second address: D3ADD7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D3ADD7 second address: D3ADDD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D3ADDD second address: D3ADF1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jg 00007F6968D54742h 0x0000000c jl 00007F6968D54736h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D3ADF1 second address: D3ADF5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D3B240 second address: D3B262 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007F6968D54736h 0x0000000a popad 0x0000000b jmp 00007F6968D5473Fh 0x00000010 jc 00007F6968D54742h 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D3B3F2 second address: D3B3FF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jng 00007F6969412EA6h 0x0000000c popad 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D3B5C0 second address: D3B5D8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F6968D54742h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D32548 second address: D32568 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F6969412EB6h 0x00000009 jc 00007F6969412EA6h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D32568 second address: D3256C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D3256C second address: D32572 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D3C0F2 second address: D3C0F8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D3C0F8 second address: D3C0FC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D3C0FC second address: D3C105 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edi 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D3C105 second address: D3C13B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F6969412EAEh 0x00000009 pop edi 0x0000000a pop edi 0x0000000b push eax 0x0000000c push edx 0x0000000d jns 00007F6969412EB2h 0x00000013 jmp 00007F6969412EAEh 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D3DB4E second address: D3DB74 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007F6968D54736h 0x0000000a jmp 00007F6968D5473Bh 0x0000000f popad 0x00000010 pop esi 0x00000011 pushad 0x00000012 push eax 0x00000013 pushad 0x00000014 popad 0x00000015 pushad 0x00000016 popad 0x00000017 pop eax 0x00000018 jng 00007F6968D54742h 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D3DB74 second address: D3DB7A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CF9547 second address: CF954D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D420B9 second address: D420BD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D433D6 second address: D433DA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D06EFB second address: D06F03 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D06F03 second address: D06F27 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 pushad 0x00000007 push edi 0x00000008 pushad 0x00000009 popad 0x0000000a pushad 0x0000000b popad 0x0000000c pop edi 0x0000000d jno 00007F6968D5473Eh 0x00000013 push esi 0x00000014 jg 00007F6968D54736h 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D48D91 second address: D48DA1 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push edi 0x00000004 pop edi 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push edi 0x0000000b pushad 0x0000000c popad 0x0000000d push edx 0x0000000e pop edx 0x0000000f pop edi 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D48DA1 second address: D48DA7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D48DA7 second address: D48DE0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6969412EB6h 0x00000007 jg 00007F6969412EA6h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pushad 0x00000010 jmp 00007F6969412EB6h 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D48DE0 second address: D48DE6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D49096 second address: D490B0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 jns 00007F6969412EAAh 0x0000000b pushad 0x0000000c pushad 0x0000000d popad 0x0000000e jnp 00007F6969412EA6h 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D49E7B second address: D49E93 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F6968D5473Fh 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D49E93 second address: D49EB6 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pushad 0x00000004 popad 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr [esp+04h] 0x0000000c push esi 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007F6969412EB4h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D49EB6 second address: D49EDB instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop esi 0x00000007 mov eax, dword ptr [eax] 0x00000009 jng 00007F6968D5473Eh 0x0000000f mov dword ptr [esp+04h], eax 0x00000013 push eax 0x00000014 push edx 0x00000015 jg 00007F6968D54738h 0x0000001b pushad 0x0000001c popad 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D49EDB second address: D49F34 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6969412EB7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop eax 0x0000000a push 00000000h 0x0000000c push eax 0x0000000d call 00007F6969412EA8h 0x00000012 pop eax 0x00000013 mov dword ptr [esp+04h], eax 0x00000017 add dword ptr [esp+04h], 00000019h 0x0000001f inc eax 0x00000020 push eax 0x00000021 ret 0x00000022 pop eax 0x00000023 ret 0x00000024 push EACE04C4h 0x00000029 pushad 0x0000002a jmp 00007F6969412EB1h 0x0000002f pushad 0x00000030 push ebx 0x00000031 pop ebx 0x00000032 push eax 0x00000033 push edx 0x00000034 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D4A634 second address: D4A638 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D4A638 second address: D4A650 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b jc 00007F6969412EA6h 0x00000011 jng 00007F6969412EA6h 0x00000017 popad 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D4ABDA second address: D4ABE1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D4ABE1 second address: D4ABEE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D4ABEE second address: D4ABF2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D4ABF2 second address: D4AC37 instructions: 0x00000000 rdtsc 0x00000002 je 00007F6969412EA6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b xchg eax, ebx 0x0000000c push 00000000h 0x0000000e push ebp 0x0000000f call 00007F6969412EA8h 0x00000014 pop ebp 0x00000015 mov dword ptr [esp+04h], ebp 0x00000019 add dword ptr [esp+04h], 0000001Bh 0x00000021 inc ebp 0x00000022 push ebp 0x00000023 ret 0x00000024 pop ebp 0x00000025 ret 0x00000026 jp 00007F6969412EACh 0x0000002c mov esi, dword ptr [ebp+122D3C94h] 0x00000032 push eax 0x00000033 pushad 0x00000034 jo 00007F6969412EACh 0x0000003a push eax 0x0000003b push edx 0x0000003c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D4AC37 second address: D4AC53 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 jmp 00007F6968D54745h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D4B058 second address: D4B05E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D4B151 second address: D4B16D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6968D54748h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D4B16D second address: D4B18E instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 jmp 00007F6969412EB5h 0x00000008 pop esi 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push ebx 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D4B220 second address: D4B225 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D4B765 second address: D4B76A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D4B76A second address: D4B770 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D4B770 second address: D4B774 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D4B774 second address: D4B7B3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 nop 0x00000009 and edi, dword ptr [ebp+122D2ECBh] 0x0000000f call 00007F6968D5473Ch 0x00000014 add dword ptr [ebp+122D1E21h], edx 0x0000001a pop esi 0x0000001b push 00000000h 0x0000001d mov edi, dword ptr [ebp+122D2C93h] 0x00000023 sub dword ptr [ebp+122D3845h], eax 0x00000029 push 00000000h 0x0000002b mov dword ptr [ebp+122D3D45h], ebx 0x00000031 push eax 0x00000032 push eax 0x00000033 push edx 0x00000034 push eax 0x00000035 push ebx 0x00000036 pop ebx 0x00000037 pop eax 0x00000038 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D4B7B3 second address: D4B7B9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D4C1BF second address: D4C1C6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D4BFAF second address: D4BFB9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 ja 00007F6969412EA6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D4DC34 second address: D4DC90 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jo 00007F6968D54738h 0x0000000c push eax 0x0000000d pop eax 0x0000000e popad 0x0000000f mov dword ptr [esp], eax 0x00000012 xor edi, dword ptr [ebp+122D30FEh] 0x00000018 push 00000000h 0x0000001a push 00000000h 0x0000001c push ebx 0x0000001d call 00007F6968D54738h 0x00000022 pop ebx 0x00000023 mov dword ptr [esp+04h], ebx 0x00000027 add dword ptr [esp+04h], 00000016h 0x0000002f inc ebx 0x00000030 push ebx 0x00000031 ret 0x00000032 pop ebx 0x00000033 ret 0x00000034 mov edi, dword ptr [ebp+122D2433h] 0x0000003a push 00000000h 0x0000003c push eax 0x0000003d pushad 0x0000003e jmp 00007F6968D54747h 0x00000043 push esi 0x00000044 push eax 0x00000045 push edx 0x00000046 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D4C94B second address: D4C95E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007F6969412EA6h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d jno 00007F6969412EA6h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D4C95E second address: D4C962 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D4F075 second address: D4F0A9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ebx 0x00000007 mov dword ptr [esp], eax 0x0000000a push 00000000h 0x0000000c cld 0x0000000d push 00000000h 0x0000000f push 00000000h 0x00000011 push ebx 0x00000012 call 00007F6969412EA8h 0x00000017 pop ebx 0x00000018 mov dword ptr [esp+04h], ebx 0x0000001c add dword ptr [esp+04h], 00000016h 0x00000024 inc ebx 0x00000025 push ebx 0x00000026 ret 0x00000027 pop ebx 0x00000028 ret 0x00000029 xchg eax, ebx 0x0000002a push eax 0x0000002b push edx 0x0000002c push eax 0x0000002d push edx 0x0000002e push eax 0x0000002f push edx 0x00000030 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D4F0A9 second address: D4F0AD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D4F0AD second address: D4F0B7 instructions: 0x00000000 rdtsc 0x00000002 jng 00007F6969412EA6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D4F0B7 second address: D4F0BD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D4FA6F second address: D4FA73 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D4F833 second address: D4F83B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D4FA73 second address: D4FA82 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jng 00007F6969412EA6h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D4F83B second address: D4F841 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D53563 second address: D53567 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D54B1E second address: D54BD0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6968D54742h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b push ebx 0x0000000c ja 00007F6968D54736h 0x00000012 pop ebx 0x00000013 jmp 00007F6968D5473Bh 0x00000018 popad 0x00000019 nop 0x0000001a add bx, 8901h 0x0000001f push 00000000h 0x00000021 push 00000000h 0x00000023 push ebx 0x00000024 call 00007F6968D54738h 0x00000029 pop ebx 0x0000002a mov dword ptr [esp+04h], ebx 0x0000002e add dword ptr [esp+04h], 00000014h 0x00000036 inc ebx 0x00000037 push ebx 0x00000038 ret 0x00000039 pop ebx 0x0000003a ret 0x0000003b mov dword ptr [ebp+122D2441h], ecx 0x00000041 mov dword ptr [ebp+122D32B2h], esi 0x00000047 push 00000000h 0x00000049 push 00000000h 0x0000004b push ebx 0x0000004c call 00007F6968D54738h 0x00000051 pop ebx 0x00000052 mov dword ptr [esp+04h], ebx 0x00000056 add dword ptr [esp+04h], 0000001Ah 0x0000005e inc ebx 0x0000005f push ebx 0x00000060 ret 0x00000061 pop ebx 0x00000062 ret 0x00000063 jmp 00007F6968D5473Fh 0x00000068 jmp 00007F6968D54749h 0x0000006d push eax 0x0000006e push eax 0x0000006f push eax 0x00000070 push edx 0x00000071 jns 00007F6968D54736h 0x00000077 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D57C58 second address: D57C5C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D59C75 second address: D59C82 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D59C82 second address: D59C86 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D59C86 second address: D59D1D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop eax 0x00000007 nop 0x00000008 push 00000000h 0x0000000a push edi 0x0000000b call 00007F6968D54738h 0x00000010 pop edi 0x00000011 mov dword ptr [esp+04h], edi 0x00000015 add dword ptr [esp+04h], 00000014h 0x0000001d inc edi 0x0000001e push edi 0x0000001f ret 0x00000020 pop edi 0x00000021 ret 0x00000022 movzx edi, ax 0x00000025 jmp 00007F6968D5473Bh 0x0000002a push 00000000h 0x0000002c mov ebx, 6BA15991h 0x00000031 push 00000000h 0x00000033 push 00000000h 0x00000035 push eax 0x00000036 call 00007F6968D54738h 0x0000003b pop eax 0x0000003c mov dword ptr [esp+04h], eax 0x00000040 add dword ptr [esp+04h], 0000001Dh 0x00000048 inc eax 0x00000049 push eax 0x0000004a ret 0x0000004b pop eax 0x0000004c ret 0x0000004d jmp 00007F6968D54749h 0x00000052 xchg eax, esi 0x00000053 jmp 00007F6968D54744h 0x00000058 push eax 0x00000059 pushad 0x0000005a push ebx 0x0000005b pushad 0x0000005c popad 0x0000005d pop ebx 0x0000005e push ebx 0x0000005f push eax 0x00000060 push edx 0x00000061 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D53CE7 second address: D53CF9 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edi 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jns 00007F6969412EA8h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D56DD0 second address: D56DE0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F6968D5473Ch 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D56DE0 second address: D56DE4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D5BCB0 second address: D5BCB4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D5BD65 second address: D5BD7C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 pushad 0x00000006 popad 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b pushad 0x0000000c jnc 00007F6969412EA8h 0x00000012 push eax 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D58F24 second address: D58F2E instructions: 0x00000000 rdtsc 0x00000002 jns 00007F6968D5473Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D58F2E second address: D58F3F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 jo 00007F6969412EB0h 0x0000000d push eax 0x0000000e push edx 0x0000000f push edi 0x00000010 pop edi 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D5DD05 second address: D5DD1E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F6968D54745h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D5ECF9 second address: D5ED89 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 jmp 00007F6969412EB4h 0x00000008 pop edx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c jg 00007F6969412EBCh 0x00000012 nop 0x00000013 mov di, DC2Dh 0x00000017 push 00000000h 0x00000019 push 00000000h 0x0000001b push esi 0x0000001c call 00007F6969412EA8h 0x00000021 pop esi 0x00000022 mov dword ptr [esp+04h], esi 0x00000026 add dword ptr [esp+04h], 00000015h 0x0000002e inc esi 0x0000002f push esi 0x00000030 ret 0x00000031 pop esi 0x00000032 ret 0x00000033 push eax 0x00000034 mov bx, 857Ah 0x00000038 pop ebx 0x00000039 push 00000000h 0x0000003b push 00000000h 0x0000003d push edx 0x0000003e call 00007F6969412EA8h 0x00000043 pop edx 0x00000044 mov dword ptr [esp+04h], edx 0x00000048 add dword ptr [esp+04h], 0000001Ah 0x00000050 inc edx 0x00000051 push edx 0x00000052 ret 0x00000053 pop edx 0x00000054 ret 0x00000055 push eax 0x00000056 push eax 0x00000057 push edx 0x00000058 jo 00007F6969412EA8h 0x0000005e push edi 0x0000005f pop edi 0x00000060 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D5FC1F second address: D5FC23 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D60C7E second address: D60C87 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D60C87 second address: D60C8D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D60C8D second address: D60C9E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b jbe 00007F6969412EA6h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D60C9E second address: D60CA4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D5FD39 second address: D5FD3D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D5FD3D second address: D5FD51 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6968D54740h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D5FD51 second address: D5FD61 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 pushad 0x00000006 popad 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push edi 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D5FD61 second address: D5FD66 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D61FEC second address: D62003 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6969412EB3h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D620FB second address: D62101 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D6AD33 second address: D6AD3B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D6A462 second address: D6A467 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D6A5FB second address: D6A601 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D6A601 second address: D6A605 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D6E8CE second address: D6E8D2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D757AB second address: D757AF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D757AF second address: D757B5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D74516 second address: D7451A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D7451A second address: D7451E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D7451E second address: D7452A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jbe 00007F6968D54736h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CFCA36 second address: CFCA68 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pushad 0x00000006 popad 0x00000007 jmp 00007F6969412EB5h 0x0000000c pop esi 0x0000000d push edx 0x0000000e ja 00007F6969412EA6h 0x00000014 pop edx 0x00000015 popad 0x00000016 jo 00007F6969412EC1h 0x0000001c push eax 0x0000001d push edx 0x0000001e pushad 0x0000001f popad 0x00000020 push eax 0x00000021 push edx 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D74C57 second address: D74C5D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D74C5D second address: D74C61 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D74C61 second address: D74C69 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push edx 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D74C69 second address: D74C6E instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D75056 second address: D7505A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D7505A second address: D7507D instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 js 00007F6969412EA6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F6969412EAFh 0x00000013 jno 00007F6969412EA6h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D7507D second address: D7508F instructions: 0x00000000 rdtsc 0x00000002 jp 00007F6968D54736h 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D7508F second address: D75095 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D75095 second address: D750B4 instructions: 0x00000000 rdtsc 0x00000002 je 00007F6968D54736h 0x00000008 jmp 00007F6968D54745h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D750B4 second address: D750C8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F6969412EB0h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D750C8 second address: D750CC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D750CC second address: D750D2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D754E8 second address: D754FC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jo 00007F6968D5473Eh 0x0000000c pushad 0x0000000d popad 0x0000000e jl 00007F6968D54736h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D089B9 second address: D089BF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D089BF second address: D089F2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6968D54741h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 js 00007F6968D54754h 0x0000000f pushad 0x00000010 pushad 0x00000011 popad 0x00000012 jnp 00007F6968D54736h 0x00000018 push ebx 0x00000019 pop ebx 0x0000001a push edx 0x0000001b pop edx 0x0000001c popad 0x0000001d push eax 0x0000001e push edx 0x0000001f pushad 0x00000020 popad 0x00000021 jp 00007F6968D54736h 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D7E3EC second address: D7E3F2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D7E3F2 second address: D7E3F8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D7E3F8 second address: D7E3FC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D7E6A9 second address: D7E6B2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D7E6B2 second address: D7E6B6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D7E6B6 second address: D7E6BA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D7E826 second address: D7E82A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D7E82A second address: D7E836 instructions: 0x00000000 rdtsc 0x00000002 jne 00007F6968D54736h 0x00000008 push eax 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D7E836 second address: D7E85A instructions: 0x00000000 rdtsc 0x00000002 jno 00007F6969412EA8h 0x00000008 pushad 0x00000009 jmp 00007F6969412EB1h 0x0000000e ja 00007F6969412EA6h 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D7E9C5 second address: D7E9CC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D7EC5B second address: D7EC73 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 pushad 0x0000000a popad 0x0000000b jnl 00007F6969412EA6h 0x00000011 pushad 0x00000012 popad 0x00000013 popad 0x00000014 push eax 0x00000015 push edx 0x00000016 pushad 0x00000017 popad 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D7F241 second address: D7F247 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D7F247 second address: D7F25D instructions: 0x00000000 rdtsc 0x00000002 js 00007F6969412EA6h 0x00000008 jmp 00007F6969412EACh 0x0000000d pop edx 0x0000000e pop eax 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D515B9 second address: D32548 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pop ebx 0x00000006 push eax 0x00000007 jng 00007F6968D5474Fh 0x0000000d jmp 00007F6968D54749h 0x00000012 nop 0x00000013 lea eax, dword ptr [ebp+1249633Ch] 0x00000019 push eax 0x0000001a pushad 0x0000001b pushad 0x0000001c jno 00007F6968D54736h 0x00000022 jmp 00007F6968D54746h 0x00000027 popad 0x00000028 pushad 0x00000029 pushad 0x0000002a popad 0x0000002b pushad 0x0000002c popad 0x0000002d popad 0x0000002e popad 0x0000002f mov dword ptr [esp], eax 0x00000032 pushad 0x00000033 movsx edi, ax 0x00000036 movsx eax, ax 0x00000039 popad 0x0000003a call dword ptr [ebp+122D30FEh] 0x00000040 push eax 0x00000041 push edx 0x00000042 jo 00007F6968D54738h 0x00000048 push eax 0x00000049 pop eax 0x0000004a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D51C9B second address: D51CA5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 js 00007F6969412EA6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D51D09 second address: D51D14 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edi 0x00000008 push ebx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D51D14 second address: D51D28 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pop edi 0x00000006 xchg eax, esi 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007F6969412EAAh 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D51D28 second address: D51D33 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jno 00007F6968D54736h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D524AA second address: D524AF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D52672 second address: D52676 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D52814 second address: D52818 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D52818 second address: D52845 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F6968D54736h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jnl 00007F6968D5473Ch 0x00000010 popad 0x00000011 push eax 0x00000012 push eax 0x00000013 push edx 0x00000014 pushad 0x00000015 jmp 00007F6968D54740h 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D52845 second address: D5284A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D8351D second address: D83529 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007F6968D54736h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D83529 second address: D83538 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jbe 00007F6969412EA6h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D83538 second address: D83542 instructions: 0x00000000 rdtsc 0x00000002 jg 00007F6968D54736h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D83542 second address: D83550 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 jp 00007F6969412EA6h 0x00000009 pop edx 0x0000000a push eax 0x0000000b push edx 0x0000000c push ecx 0x0000000d pop ecx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D83550 second address: D83575 instructions: 0x00000000 rdtsc 0x00000002 jno 00007F6968D54736h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F6968D54747h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D837E4 second address: D837FB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007F6969412EB0h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D0DBB8 second address: D0DBC6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F6968D5473Ah 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D0DBC6 second address: D0DBCA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D0DBCA second address: D0DBE4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F6968D5473Eh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D8AACD second address: D8AAD6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push edi 0x00000006 push eax 0x00000007 pop eax 0x00000008 pop edi 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D8A242 second address: D8A248 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D8A248 second address: D8A24C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D8A24C second address: D8A25E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop edx 0x00000009 push esi 0x0000000a push eax 0x0000000b push edx 0x0000000c ja 00007F6968D54736h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D8AF16 second address: D8AF29 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 pushad 0x00000007 popad 0x00000008 pushad 0x00000009 popad 0x0000000a popad 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e pop edx 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D8AF29 second address: D8AF2D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D8AF2D second address: D8AF7D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6969412EABh 0x00000007 push eax 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b popad 0x0000000c pushad 0x0000000d pushad 0x0000000e push edx 0x0000000f pop edx 0x00000010 jmp 00007F6969412EB9h 0x00000015 jmp 00007F6969412EB4h 0x0000001a pushad 0x0000001b popad 0x0000001c popad 0x0000001d push eax 0x0000001e push edx 0x0000001f push edx 0x00000020 pop edx 0x00000021 jl 00007F6969412EA6h 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D8AF7D second address: D8AF81 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D8AF81 second address: D8AF87 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D91EB3 second address: D91EE1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 jmp 00007F6968D54748h 0x0000000b jmp 00007F6968D5473Bh 0x00000010 pop eax 0x00000011 push eax 0x00000012 push edx 0x00000013 push edx 0x00000014 pop edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D91EE1 second address: D91EE7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D91EE7 second address: D91F0E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jns 00007F6968D54738h 0x0000000c popad 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007F6968D54745h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D91F0E second address: D91F1D instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jbe 00007F6969412EA6h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D91F1D second address: D91F23 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D91F23 second address: D91F2B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D91BAB second address: D91BDD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 jmp 00007F6968D5473Fh 0x0000000a pop ebx 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e pushad 0x0000000f popad 0x00000010 pushad 0x00000011 popad 0x00000012 jmp 00007F6968D54744h 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D91BDD second address: D91BE2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D9BD4F second address: D9BD53 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D9BD53 second address: D9BD5D instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F6969412EA6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D9BD5D second address: D9BD71 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edi 0x00000007 pushad 0x00000008 popad 0x00000009 jmp 00007F6968D5473Ah 0x0000000e pop edi 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D9AEB8 second address: D9AEC1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D9AEC1 second address: D9AEC5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D9AEC5 second address: D9AED8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6969412EAFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D9AED8 second address: D9AEF9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F6968D54746h 0x00000008 pushad 0x00000009 popad 0x0000000a push ebx 0x0000000b pop ebx 0x0000000c popad 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D9B359 second address: D9B371 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F6969412EB2h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D9B50E second address: D9B514 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D9B6AD second address: D9B6D1 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F6969412EA6h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f push ecx 0x00000010 push edi 0x00000011 pop edi 0x00000012 jmp 00007F6969412EB1h 0x00000017 pop ecx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D9B6D1 second address: D9B6E3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jns 00007F6968D54736h 0x0000000b pushad 0x0000000c popad 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 push edx 0x00000011 pop edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D9B856 second address: D9B865 instructions: 0x00000000 rdtsc 0x00000002 jp 00007F6969412EA6h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DA0246 second address: DA024A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DA024A second address: DA0250 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DA0250 second address: DA025A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jne 00007F6968D54736h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DA025A second address: DA025E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DA03AF second address: DA03C1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6968D5473Eh 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DA03C1 second address: DA03C7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D52266 second address: D5226A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D5226A second address: D52274 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F6969412EA6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DA159D second address: DA15A3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DA15A3 second address: DA15A7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DA478F second address: DA47A9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6968D54746h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CFE6C7 second address: CFE6D1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push esi 0x00000009 pop esi 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CFE6D1 second address: CFE6D7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CFE6D7 second address: CFE6DC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CFE6DC second address: CFE6E2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CFE6E2 second address: CFE6EC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DAA470 second address: DAA4AF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007F6968D54736h 0x0000000a popad 0x0000000b pushad 0x0000000c jmp 00007F6968D54744h 0x00000011 jmp 00007F6968D54746h 0x00000016 jnc 00007F6968D54736h 0x0000001c push ecx 0x0000001d pop ecx 0x0000001e popad 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DAAD5A second address: DAAD75 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6969412EB4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DAAD75 second address: DAAD7B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DAB366 second address: DAB38A instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push edx 0x0000000a pop edx 0x0000000b jmp 00007F6969412EB7h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DAB38A second address: DAB3AA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 popad 0x00000007 jmp 00007F6968D54744h 0x0000000c popad 0x0000000d pushad 0x0000000e push ecx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DAB688 second address: DAB68E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DAB68E second address: DAB6AD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007F6968D54749h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DAB6AD second address: DAB6B1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DAB6B1 second address: DAB6F7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push esi 0x0000000a jmp 00007F6968D54744h 0x0000000f jmp 00007F6968D54743h 0x00000014 pop esi 0x00000015 jng 00007F6968D5473Eh 0x0000001b push edx 0x0000001c pop edx 0x0000001d jl 00007F6968D54736h 0x00000023 push eax 0x00000024 push edx 0x00000025 push esi 0x00000026 pop esi 0x00000027 push eax 0x00000028 push edx 0x00000029 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DAB6F7 second address: DAB6FB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DAB6FB second address: DAB705 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F6968D54736h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DAB9BC second address: DAB9CD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 jp 00007F6969412EA6h 0x0000000f push edi 0x00000010 pop edi 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DAB9CD second address: DABA19 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007F6968D5473Dh 0x0000000c jnl 00007F6968D54736h 0x00000012 popad 0x00000013 popad 0x00000014 push eax 0x00000015 push edx 0x00000016 jmp 00007F6968D5473Dh 0x0000001b pushad 0x0000001c jmp 00007F6968D54743h 0x00000021 jnc 00007F6968D54736h 0x00000027 jne 00007F6968D54736h 0x0000002d popad 0x0000002e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DABA19 second address: DABA3C instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 jl 00007F6969412EA6h 0x00000009 jmp 00007F6969412EB1h 0x0000000e pop esi 0x0000000f jo 00007F6969412EACh 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DABCAE second address: DABCDB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pushad 0x00000006 jmp 00007F6968D54741h 0x0000000b jmp 00007F6968D54745h 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DB5441 second address: DB5460 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 pushad 0x00000009 popad 0x0000000a popad 0x0000000b jmp 00007F6969412EABh 0x00000010 pop eax 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 push ebx 0x00000015 pop ebx 0x00000016 push eax 0x00000017 pop eax 0x00000018 popad 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DB458B second address: DB45CD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnl 00007F6968D54736h 0x0000000a jnc 00007F6968D54736h 0x00000010 jng 00007F6968D54736h 0x00000016 popad 0x00000017 push eax 0x00000018 push edx 0x00000019 jmp 00007F6968D54743h 0x0000001e jmp 00007F6968D54746h 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DB485A second address: DB487D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6969412EAFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push ebx 0x0000000b pop ebx 0x0000000c jno 00007F6969412EA6h 0x00000012 jp 00007F6969412EA6h 0x00000018 popad 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DB487D second address: DB489B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F6968D54744h 0x00000009 js 00007F6968D54736h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DB4D1D second address: DB4D39 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F6969412EB6h 0x00000009 push edx 0x0000000a pop edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DB5149 second address: DB516E instructions: 0x00000000 rdtsc 0x00000002 jp 00007F6968D54736h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b jns 00007F6968D54736h 0x00000011 jmp 00007F6968D54742h 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DB516E second address: DB5173 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DB5173 second address: DB517E instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push esi 0x00000004 pop esi 0x00000005 pop ebx 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DBC22C second address: DBC271 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 pop eax 0x00000005 pushad 0x00000006 popad 0x00000007 jmp 00007F6969412EB9h 0x0000000c push ebx 0x0000000d pop ebx 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 push eax 0x00000012 push edx 0x00000013 je 00007F6969412EBEh 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DBC271 second address: DBC276 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DBC276 second address: DBC28C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop esi 0x00000007 pushad 0x00000008 jmp 00007F6969412EAAh 0x0000000d pushad 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DBC815 second address: DBC819 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DBC819 second address: DBC82E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 je 00007F6969412EA6h 0x0000000d je 00007F6969412EA6h 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DBC82E second address: DBC839 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DBC839 second address: DBC83D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DBCB00 second address: DBCB04 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DBCF1F second address: DBCF23 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DBCF23 second address: DBCF2D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DBCF2D second address: DBCF4A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 push ebx 0x0000000a pop ebx 0x0000000b jmp 00007F6969412EADh 0x00000010 popad 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 pop eax 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DBDE44 second address: DBDE4A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DC49B7 second address: DC49BD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DC4403 second address: DC440D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push ebx 0x00000007 pop ebx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DC440D second address: DC4434 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push esi 0x00000006 jmp 00007F6969412EB6h 0x0000000b pop esi 0x0000000c popad 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 jp 00007F6969412EA6h 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DC4434 second address: DC4455 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6968D5473Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F6968D5473Eh 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DC45BD second address: DC45DF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 popad 0x00000006 pushad 0x00000007 push ebx 0x00000008 pushad 0x00000009 popad 0x0000000a pop ebx 0x0000000b jne 00007F6969412EACh 0x00000011 push edx 0x00000012 jno 00007F6969412EA6h 0x00000018 pop edx 0x00000019 push esi 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DD3715 second address: DD3719 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DD3719 second address: DD372D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jo 00007F6969412EAEh 0x0000000c jo 00007F6969412EA6h 0x00000012 push edi 0x00000013 pop edi 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DD6EDD second address: DD6EE1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DD6EE1 second address: DD6EF7 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F6969412EA6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jnc 00007F6969412EACh 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DDC86F second address: DDC879 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F6968D5473Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DE3D56 second address: DE3D69 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007F6969412EA6h 0x0000000a pushad 0x0000000b popad 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f push ecx 0x00000010 pop ecx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DE3D69 second address: DE3D6D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DE3D6D second address: DE3D96 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 jmp 00007F6969412EB5h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b popad 0x0000000c pushad 0x0000000d push edx 0x0000000e push ebx 0x0000000f pop ebx 0x00000010 pop edx 0x00000011 push eax 0x00000012 push edx 0x00000013 jo 00007F6969412EA6h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DEAD5F second address: DEAD63 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DEAEF4 second address: DEAF00 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 jl 00007F6969412EA6h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DEB506 second address: DEB523 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 jmp 00007F6968D54742h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c pushad 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DEFECF second address: DEFEE2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 jc 00007F6969412EA8h 0x0000000e push ebx 0x0000000f pop ebx 0x00000010 push esi 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DEFEE2 second address: DEFEFE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F6968D54747h 0x00000009 pop esi 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DEFEFE second address: DEFF09 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jnl 00007F6969412EA6h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DF1887 second address: DF188D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DF188D second address: DF1892 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DFB022 second address: DFB026 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: E028B4 second address: E028BB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: E028BB second address: E028C9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007F6968D54736h 0x0000000a popad 0x0000000b push ecx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: E04196 second address: E0419C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: E0419C second address: E041AA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jnp 00007F6968D54736h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: E041AA second address: E041B0 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D001A2 second address: D001A6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D001A6 second address: D001CD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F6969412EB5h 0x0000000d jmp 00007F6969412EAAh 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D001CD second address: D001D1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: E065BF second address: E065C3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: E065C3 second address: E065E4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6968D54747h 0x00000007 jns 00007F6968D54736h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DFFFA0 second address: DFFFA4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: E153CF second address: E153DB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007F6968D54736h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: E153DB second address: E153F5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jbe 00007F6969412EA8h 0x0000000b popad 0x0000000c js 00007F6969412EB2h 0x00000012 push eax 0x00000013 push edx 0x00000014 push edx 0x00000015 pop edx 0x00000016 pushad 0x00000017 popad 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: E14F2D second address: E14F4F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F6968D54746h 0x00000009 popad 0x0000000a pop esi 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: E14F4F second address: E14F53 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: E14F53 second address: E14F5D instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 pushad 0x00000008 popad 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: E2F03A second address: E2F056 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F6969412EB2h 0x00000009 js 00007F6969412EA6h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: E2E10C second address: E2E122 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6968D5473Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: E2E27A second address: E2E286 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jnp 00007F6969412EA6h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: E2E286 second address: E2E2A8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jno 00007F6968D54736h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d jmp 00007F6968D5473Ch 0x00000012 push edi 0x00000013 pop edi 0x00000014 pop eax 0x00000015 pop edx 0x00000016 pop eax 0x00000017 push eax 0x00000018 pushad 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: E2E2A8 second address: E2E2B6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 push ebx 0x0000000a pushad 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: E2E7CD second address: E2E7D8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 push ecx 0x00000007 pop ecx 0x00000008 push esi 0x00000009 pop esi 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: E2ED2A second address: E2ED36 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 push ebx 0x00000007 pop ebx 0x00000008 popad 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: E3063E second address: E30642 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: E32EC2 second address: E32ECE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop edi 0x00000006 push eax 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: E32ECE second address: E32ED2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: E33223 second address: E3325E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6969412EB7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [eax] 0x0000000b pushad 0x0000000c push eax 0x0000000d jg 00007F6969412EA6h 0x00000013 pop eax 0x00000014 push eax 0x00000015 push eax 0x00000016 pop eax 0x00000017 pop eax 0x00000018 popad 0x00000019 mov dword ptr [esp+04h], eax 0x0000001d push eax 0x0000001e push edx 0x0000001f jmp 00007F6969412EAAh 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: E3325E second address: E33268 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jng 00007F6968D54736h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: E334DF second address: E334E3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: E334E3 second address: E334E9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: E334E9 second address: E334ED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: E334ED second address: E334F1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: E36567 second address: E36570 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: E36570 second address: E36576 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: E36576 second address: E3657A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: E3657A second address: E365C7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6968D54748h 0x00000007 jmp 00007F6968D54747h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e jmp 00007F6968D5473Dh 0x00000013 popad 0x00000014 pushad 0x00000015 pushad 0x00000016 push eax 0x00000017 pop eax 0x00000018 pushad 0x00000019 popad 0x0000001a pushad 0x0000001b popad 0x0000001c popad 0x0000001d push eax 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C30C4D second address: 4C30C7A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007F6969412EB1h 0x00000008 pop eax 0x00000009 movsx edi, si 0x0000000c popad 0x0000000d pop edx 0x0000000e pop eax 0x0000000f xchg eax, ebp 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007F6969412EAFh 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C70E05 second address: 4C70E2A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov cx, dx 0x00000006 mov ch, dh 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebp 0x0000000c jmp 00007F6968D54742h 0x00000011 push eax 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 pushad 0x00000017 popad 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C70E2A second address: 4C70E30 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C70E30 second address: 4C70E7A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6968D5473Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a jmp 00007F6968D54746h 0x0000000f mov ebp, esp 0x00000011 pushad 0x00000012 push eax 0x00000013 movsx edi, si 0x00000016 pop eax 0x00000017 push eax 0x00000018 push edx 0x00000019 call 00007F6968D54745h 0x0000001e pop esi 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C30A1E second address: 4C30A22 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C30A22 second address: 4C30A28 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C30A28 second address: 4C30A40 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F6969412EB4h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C30A40 second address: 4C30AB3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6968D5473Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov ebp, esp 0x0000000d pushad 0x0000000e pushfd 0x0000000f jmp 00007F6968D54744h 0x00000014 xor cx, 1798h 0x00000019 jmp 00007F6968D5473Bh 0x0000001e popfd 0x0000001f mov ecx, 4E00D94Fh 0x00000024 popad 0x00000025 pop ebp 0x00000026 push eax 0x00000027 push edx 0x00000028 pushad 0x00000029 pushfd 0x0000002a jmp 00007F6968D54747h 0x0000002f jmp 00007F6968D54743h 0x00000034 popfd 0x00000035 mov ah, 3Eh 0x00000037 popad 0x00000038 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C30616 second address: 4C3061C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C3061C second address: 4C30658 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6968D54744h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jmp 00007F6968D5473Bh 0x0000000f xchg eax, ebp 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007F6968D54745h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C30658 second address: 4C30675 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6969412EB1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C30675 second address: 4C30679 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C30679 second address: 4C3067F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C30585 second address: 4C305AB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov esi, ebx 0x00000005 push ebx 0x00000006 pop ecx 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b pushad 0x0000000c push edi 0x0000000d jmp 00007F6968D54740h 0x00000012 pop esi 0x00000013 popad 0x00000014 xchg eax, ebp 0x00000015 push eax 0x00000016 push edx 0x00000017 push eax 0x00000018 push edx 0x00000019 pushad 0x0000001a popad 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C305AB second address: 4C305B1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C302A6 second address: 4C302AA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C302AA second address: 4C302B0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C302B0 second address: 4C302B7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ah, A0h 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C302B7 second address: 4C302D2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 jmp 00007F6969412EAAh 0x0000000d xchg eax, ebp 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 mov esi, edx 0x00000013 push edi 0x00000014 pop ecx 0x00000015 popad 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C302D2 second address: 4C3031E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F6968D54740h 0x00000009 sub eax, 75762B38h 0x0000000f jmp 00007F6968D5473Bh 0x00000014 popfd 0x00000015 mov cx, 1D6Fh 0x00000019 popad 0x0000001a pop edx 0x0000001b pop eax 0x0000001c mov ebp, esp 0x0000001e pushad 0x0000001f mov ebx, esi 0x00000021 movzx esi, dx 0x00000024 popad 0x00000025 pop ebp 0x00000026 push eax 0x00000027 push edx 0x00000028 push eax 0x00000029 push edx 0x0000002a jmp 00007F6968D54741h 0x0000002f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C3031E second address: 4C30324 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C4001A second address: 4C4005C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6968D54741h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b jmp 00007F6968D54747h 0x00000010 mov ch, 73h 0x00000012 popad 0x00000013 xchg eax, ebp 0x00000014 push eax 0x00000015 push edx 0x00000016 jmp 00007F6968D5473Eh 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C4005C second address: 4C40061 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C40061 second address: 4C40085 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 mov ebx, 3CEB8732h 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov ebp, esp 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007F6968D54744h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C70D3A second address: 4C70D40 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C70D40 second address: 4C70D44 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C70D44 second address: 4C70D6D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push esp 0x00000009 jmp 00007F6969412EACh 0x0000000e mov dword ptr [esp], ebp 0x00000011 pushad 0x00000012 pushad 0x00000013 call 00007F6969412EACh 0x00000018 pop eax 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C502F4 second address: 4C50322 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop ebx 0x00000006 popad 0x00000007 pushad 0x00000008 mov ecx, 56A5488Bh 0x0000000d mov si, E267h 0x00000011 popad 0x00000012 popad 0x00000013 push eax 0x00000014 push eax 0x00000015 push edx 0x00000016 jmp 00007F6968D54748h 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C50322 second address: 4C503A2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov di, 1074h 0x00000007 mov si, di 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d xchg eax, ebp 0x0000000e pushad 0x0000000f call 00007F6969412EB5h 0x00000014 pushfd 0x00000015 jmp 00007F6969412EB0h 0x0000001a sub ecx, 394E0558h 0x00000020 jmp 00007F6969412EABh 0x00000025 popfd 0x00000026 pop eax 0x00000027 push edi 0x00000028 mov ecx, 04A3782Bh 0x0000002d pop esi 0x0000002e popad 0x0000002f mov ebp, esp 0x00000031 push eax 0x00000032 push edx 0x00000033 pushad 0x00000034 mov dx, ax 0x00000037 pushfd 0x00000038 jmp 00007F6969412EB4h 0x0000003d sub ecx, 0AE9D6E8h 0x00000043 jmp 00007F6969412EABh 0x00000048 popfd 0x00000049 popad 0x0000004a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C503A2 second address: 4C503A8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C503A8 second address: 4C503F2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6969412EABh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov eax, dword ptr [ebp+08h] 0x0000000e pushad 0x0000000f mov esi, 7C22C7EBh 0x00000014 pushfd 0x00000015 jmp 00007F6969412EB0h 0x0000001a sub eax, 195F3478h 0x00000020 jmp 00007F6969412EABh 0x00000025 popfd 0x00000026 popad 0x00000027 and dword ptr [eax], 00000000h 0x0000002a push eax 0x0000002b push edx 0x0000002c pushad 0x0000002d mov ax, di 0x00000030 mov bl, 2Ah 0x00000032 popad 0x00000033 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C503F2 second address: 4C5040A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F6968D54744h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C304B0 second address: 4C304D5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6969412EB1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a pushad 0x0000000b call 00007F6969412EACh 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C304D5 second address: 4C304E4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 mov cx, dx 0x00000008 popad 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C304E4 second address: 4C304EB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 mov bl, 02h 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C40D88 second address: 4C40DAE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6968D54741h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F6968D5473Dh 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C5017C second address: 4C501E4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ebx, 3AF89452h 0x00000008 pushad 0x00000009 popad 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d mov ebp, esp 0x0000000f pushad 0x00000010 pushfd 0x00000011 jmp 00007F6969412EB5h 0x00000016 sbb esi, 5ADFFB26h 0x0000001c jmp 00007F6969412EB1h 0x00000021 popfd 0x00000022 pushfd 0x00000023 jmp 00007F6969412EB0h 0x00000028 or si, 6CC8h 0x0000002d jmp 00007F6969412EABh 0x00000032 popfd 0x00000033 popad 0x00000034 pop ebp 0x00000035 push eax 0x00000036 push edx 0x00000037 push eax 0x00000038 push edx 0x00000039 push eax 0x0000003a push edx 0x0000003b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C501E4 second address: 4C501E8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C501E8 second address: 4C501EE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C706E9 second address: 4C706ED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C706ED second address: 4C706F1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C706F1 second address: 4C706FF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 test eax, eax 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c push ebx 0x0000000d pop eax 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C706FF second address: 4C70711 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 mov ecx, ebx 0x00000008 popad 0x00000009 je 00007F69DBB56104h 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C70847 second address: 4C7084B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C7084B second address: 4C7084F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C7084F second address: 4C70855 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C70855 second address: 4C70883 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6969412EADh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F6969412EB8h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C70883 second address: 4C70889 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C70889 second address: 4C7089A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F6969412EADh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C7089A second address: 4C7089E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C7089E second address: 4C708BB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ebp, esp 0x0000000a jmp 00007F6969412EADh 0x0000000f pop ebp 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C708BB second address: 4C708C2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop eax 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C2008F second address: 4C200F0 instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007F6969412EAAh 0x00000008 sub cx, 17B8h 0x0000000d jmp 00007F6969412EABh 0x00000012 popfd 0x00000013 pop edx 0x00000014 pop eax 0x00000015 popad 0x00000016 and esp, FFFFFFF8h 0x00000019 pushad 0x0000001a mov dl, ah 0x0000001c mov dx, 0194h 0x00000020 popad 0x00000021 push ebp 0x00000022 jmp 00007F6969412EB8h 0x00000027 mov dword ptr [esp], ecx 0x0000002a push eax 0x0000002b push edx 0x0000002c jmp 00007F6969412EB7h 0x00000031 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C200F0 second address: 4C200F6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C200F6 second address: 4C200FA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C200FA second address: 4C201AF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push esp 0x00000009 jmp 00007F6968D5473Ch 0x0000000e mov dword ptr [esp], ebx 0x00000011 jmp 00007F6968D54740h 0x00000016 mov ebx, dword ptr [ebp+10h] 0x00000019 pushad 0x0000001a mov di, ax 0x0000001d mov dx, ax 0x00000020 popad 0x00000021 xchg eax, esi 0x00000022 pushad 0x00000023 pushfd 0x00000024 jmp 00007F6968D54742h 0x00000029 jmp 00007F6968D54745h 0x0000002e popfd 0x0000002f movzx esi, di 0x00000032 popad 0x00000033 push eax 0x00000034 pushad 0x00000035 mov ax, AD4Fh 0x00000039 mov dl, al 0x0000003b popad 0x0000003c xchg eax, esi 0x0000003d pushad 0x0000003e call 00007F6968D5473Dh 0x00000043 pushfd 0x00000044 jmp 00007F6968D54740h 0x00000049 and ax, 9D28h 0x0000004e jmp 00007F6968D5473Bh 0x00000053 popfd 0x00000054 pop ecx 0x00000055 mov si, dx 0x00000058 popad 0x00000059 mov esi, dword ptr [ebp+08h] 0x0000005c push eax 0x0000005d push edx 0x0000005e push eax 0x0000005f push edx 0x00000060 jmp 00007F6968D5473Dh 0x00000065 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C201AF second address: 4C201C4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6969412EB1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C201C4 second address: 4C201D7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ecx, edx 0x00000005 movsx edi, cx 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, edi 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f push edi 0x00000010 pop eax 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C201D7 second address: 4C201DC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C201DC second address: 4C201FD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6968D54746h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C201FD second address: 4C20201 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C20201 second address: 4C2021D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6968D54748h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C2021D second address: 4C202FE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6969412EABh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, edi 0x0000000a jmp 00007F6969412EB6h 0x0000000f test esi, esi 0x00000011 jmp 00007F6969412EB0h 0x00000016 je 00007F69DBBA1266h 0x0000001c pushad 0x0000001d movzx ecx, di 0x00000020 mov dx, F94Eh 0x00000024 popad 0x00000025 cmp dword ptr [esi+08h], DDEEDDEEh 0x0000002c jmp 00007F6969412EB5h 0x00000031 je 00007F69DBBA1251h 0x00000037 pushad 0x00000038 mov si, 93F3h 0x0000003c pushfd 0x0000003d jmp 00007F6969412EB8h 0x00000042 adc esi, 2856D8F8h 0x00000048 jmp 00007F6969412EABh 0x0000004d popfd 0x0000004e popad 0x0000004f mov edx, dword ptr [esi+44h] 0x00000052 pushad 0x00000053 jmp 00007F6969412EB4h 0x00000058 jmp 00007F6969412EB2h 0x0000005d popad 0x0000005e or edx, dword ptr [ebp+0Ch] 0x00000061 push eax 0x00000062 push edx 0x00000063 jmp 00007F6969412EB7h 0x00000068 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 2A006A8 second address: 2A006AE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 2A006AE second address: 2A006EB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov bx, ax 0x00000006 call 00007F6969412EAEh 0x0000000b pop ecx 0x0000000c popad 0x0000000d pop edx 0x0000000e pop eax 0x0000000f mov ebp, esp 0x00000011 jmp 00007F6969412EB1h 0x00000016 and esp, FFFFFFF8h 0x00000019 push eax 0x0000001a push edx 0x0000001b jmp 00007F6969412EADh 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 2A006EB second address: 2A00707 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6968D54741h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebx 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d pushad 0x0000000e popad 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 2A00707 second address: 2A0070D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 2A0070D second address: 2A007AF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6968D54747h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c jmp 00007F6968D54749h 0x00000011 xchg eax, ebx 0x00000012 jmp 00007F6968D5473Eh 0x00000017 xchg eax, esi 0x00000018 jmp 00007F6968D54740h 0x0000001d push eax 0x0000001e jmp 00007F6968D5473Bh 0x00000023 xchg eax, esi 0x00000024 pushad 0x00000025 pushfd 0x00000026 jmp 00007F6968D54744h 0x0000002b add ah, 00000048h 0x0000002e jmp 00007F6968D5473Bh 0x00000033 popfd 0x00000034 mov ebx, ecx 0x00000036 popad 0x00000037 mov esi, dword ptr [ebp+08h] 0x0000003a push eax 0x0000003b push edx 0x0000003c jmp 00007F6968D54741h 0x00000041 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 2A007AF second address: 2A00811 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F6969412EB7h 0x00000009 sbb ax, 94EEh 0x0000000e jmp 00007F6969412EB9h 0x00000013 popfd 0x00000014 call 00007F6969412EB0h 0x00000019 pop esi 0x0000001a popad 0x0000001b pop edx 0x0000001c pop eax 0x0000001d mov ebx, 00000000h 0x00000022 push eax 0x00000023 push edx 0x00000024 jmp 00007F6969412EADh 0x00000029 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 2A00811 second address: 2A0087B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6968D54741h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 test esi, esi 0x0000000b pushad 0x0000000c call 00007F6968D5473Ch 0x00000011 call 00007F6968D54742h 0x00000016 pop eax 0x00000017 pop edx 0x00000018 call 00007F6968D54740h 0x0000001d pop edi 0x0000001e popad 0x0000001f je 00007F69DD6FA269h 0x00000025 push eax 0x00000026 push edx 0x00000027 push eax 0x00000028 push edx 0x00000029 jmp 00007F6968D54746h 0x0000002e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 2A0087B second address: 2A0088A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6969412EABh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 2A0088A second address: 2A00890 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 2A00890 second address: 2A008F5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6969412EABh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b cmp dword ptr [esi+08h], DDEEDDEEh 0x00000012 pushad 0x00000013 mov bx, si 0x00000016 mov ch, 85h 0x00000018 popad 0x00000019 mov ecx, esi 0x0000001b jmp 00007F6969412EB3h 0x00000020 je 00007F69DDDB8985h 0x00000026 jmp 00007F6969412EB6h 0x0000002b test byte ptr [77436968h], 00000002h 0x00000032 push eax 0x00000033 push edx 0x00000034 push eax 0x00000035 push edx 0x00000036 jmp 00007F6969412EAAh 0x0000003b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 2A008F5 second address: 2A008F9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 2A008F9 second address: 2A008FF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 2A008FF second address: 2A00905 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 2A00905 second address: 2A00909 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 2A00909 second address: 2A00947 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jne 00007F69DD6FA1DBh 0x0000000e jmp 00007F6968D54744h 0x00000013 mov edx, dword ptr [ebp+0Ch] 0x00000016 push eax 0x00000017 push edx 0x00000018 jmp 00007F6968D54747h 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 2A00947 second address: 2A00968 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movsx edx, cx 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebx 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F6969412EB3h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 2A00968 second address: 2A0096E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 2A0096E second address: 2A00986 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6969412EABh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 2A00986 second address: 2A0098A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 2A0098A second address: 2A00990 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 2A00990 second address: 2A009A8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6968D5473Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebx 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 2A009A8 second address: 2A009AC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 2A009AC second address: 2A009B0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 2A009B0 second address: 2A009B6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 2A009B6 second address: 2A009BC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 2A009BC second address: 2A00A2F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ebx 0x00000009 jmp 00007F6969412EB8h 0x0000000e push eax 0x0000000f jmp 00007F6969412EABh 0x00000014 xchg eax, ebx 0x00000015 jmp 00007F6969412EB6h 0x0000001a push dword ptr [ebp+14h] 0x0000001d push eax 0x0000001e push edx 0x0000001f pushad 0x00000020 pushfd 0x00000021 jmp 00007F6969412EADh 0x00000026 or cx, 7DB6h 0x0000002b jmp 00007F6969412EB1h 0x00000030 popfd 0x00000031 movzx eax, dx 0x00000034 popad 0x00000035 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 2A00A2F second address: 2A00A79 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov cx, 6C9Fh 0x00000007 pushfd 0x00000008 jmp 00007F6968D54744h 0x0000000d sub ax, 8008h 0x00000012 jmp 00007F6968D5473Bh 0x00000017 popfd 0x00000018 popad 0x00000019 pop edx 0x0000001a pop eax 0x0000001b push dword ptr [ebp+10h] 0x0000001e push eax 0x0000001f push edx 0x00000020 jmp 00007F6968D54745h 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 2A00A98 second address: 2A00AA0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 mov ax, di 0x00000007 popad 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 2A00AA0 second address: 2A00AE6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F6968D54740h 0x00000009 xor cx, 9FF8h 0x0000000e jmp 00007F6968D5473Bh 0x00000013 popfd 0x00000014 jmp 00007F6968D54748h 0x00000019 popad 0x0000001a pop edx 0x0000001b pop eax 0x0000001c pop esi 0x0000001d push eax 0x0000001e push edx 0x0000001f pushad 0x00000020 push eax 0x00000021 push edx 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 2A00AE6 second address: 2A00AEE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 mov ax, di 0x00000007 popad 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 2A00AEE second address: 2A00AFD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F6968D5473Bh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 2A00AFD second address: 2A00B01 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 2A00B01 second address: 2A00B58 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop ebx 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c pushfd 0x0000000d jmp 00007F6968D5473Eh 0x00000012 and cx, 0BE8h 0x00000017 jmp 00007F6968D5473Bh 0x0000001c popfd 0x0000001d pushfd 0x0000001e jmp 00007F6968D54748h 0x00000023 or ax, 9E48h 0x00000028 jmp 00007F6968D5473Bh 0x0000002d popfd 0x0000002e popad 0x0000002f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 2A00B58 second address: 2A00B5E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C20A69 second address: 4C20A6F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C20A6F second address: 4C20A73 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C20A73 second address: 4C20A90 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ebp 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F6968D54740h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C20A90 second address: 4C20A94 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C20A94 second address: 4C20A9A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C909BF second address: 4C909D2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6969412EAFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C909D2 second address: 4C90A21 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov edx, 01E17F5Ah 0x00000008 jmp 00007F6968D5473Bh 0x0000000d popad 0x0000000e pop edx 0x0000000f pop eax 0x00000010 mov ebp, esp 0x00000012 pushad 0x00000013 mov bl, cl 0x00000015 mov si, di 0x00000018 popad 0x00000019 pop ebp 0x0000001a push eax 0x0000001b push edx 0x0000001c pushad 0x0000001d pushfd 0x0000001e jmp 00007F6968D54744h 0x00000023 xor esi, 0C7B73F8h 0x00000029 jmp 00007F6968D5473Bh 0x0000002e popfd 0x0000002f mov si, C52Fh 0x00000033 popad 0x00000034 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C90799 second address: 4C907B9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6969412EB5h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C907B9 second address: 4C907BF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C3001B second address: 4C3003F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6969412EB9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C3003F second address: 4C30045 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C30045 second address: 4C3005A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F6969412EB1h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C3005A second address: 4C30078 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jmp 00007F6968D5473Ch 0x0000000e xchg eax, ebp 0x0000000f pushad 0x00000010 mov al, 95h 0x00000012 push eax 0x00000013 push edx 0x00000014 mov cx, di 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C90C45 second address: 4C90C49 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C90C49 second address: 4C90C4F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C90C4F second address: 4C90C55 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C90C55 second address: 4C90CA7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6968D5473Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebp 0x0000000c pushad 0x0000000d call 00007F6968D5473Eh 0x00000012 jmp 00007F6968D54742h 0x00000017 pop eax 0x00000018 mov bx, 6D36h 0x0000001c popad 0x0000001d push eax 0x0000001e push eax 0x0000001f push edx 0x00000020 jmp 00007F6968D54743h 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C90CA7 second address: 4C90CF6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6969412EB9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a jmp 00007F6969412EAEh 0x0000000f mov ebp, esp 0x00000011 jmp 00007F6969412EB0h 0x00000016 push dword ptr [ebp+0Ch] 0x00000019 push eax 0x0000001a push edx 0x0000001b push eax 0x0000001c push edx 0x0000001d jmp 00007F6969412EAAh 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C90CF6 second address: 4C90D05 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6968D5473Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C90D05 second address: 4C90D34 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6969412EB9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push dword ptr [ebp+08h] 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F6969412EADh 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C90D34 second address: 4C90D5A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6968D54741h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push BF632AD1h 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007F6968D5473Ah 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C90D5A second address: 4C90D60 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C90D60 second address: 4C90D64 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C90D64 second address: 4C90D68 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C90DC2 second address: 4C90E06 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov di, ax 0x00000006 mov cx, 8E0Dh 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d movzx eax, al 0x00000010 pushad 0x00000011 pushfd 0x00000012 jmp 00007F6968D54746h 0x00000017 and ah, 00000058h 0x0000001a jmp 00007F6968D5473Bh 0x0000001f popfd 0x00000020 mov ecx, 0C07F40Fh 0x00000025 popad 0x00000026 pop ebp 0x00000027 push eax 0x00000028 push edx 0x00000029 push eax 0x0000002a push edx 0x0000002b pushad 0x0000002c popad 0x0000002d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C90E06 second address: 4C90E0C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | RDTSC instruction interceptor: First address: 1127D17 second address: 1127D2C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push esi 0x00000006 pushad 0x00000007 jnp 00007F6968D54736h 0x0000000d jnp 00007F6968D54736h 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | RDTSC instruction interceptor: First address: 1127E95 second address: 1127EB6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jmp 00007F6969412EB9h 0x0000000d rdtsc |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | RDTSC instruction interceptor: First address: 1127EB6 second address: 1127EC2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jbe 00007F6968D54736h 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | RDTSC instruction interceptor: First address: 1127EC2 second address: 1127EC6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | RDTSC instruction interceptor: First address: 1127EC6 second address: 1127EEB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007F6968D54745h 0x0000000f jg 00007F6968D54736h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C4029A second address: 4C4029E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C4029E second address: 4C402A4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C402A4 second address: 4C402C3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6969412EB4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C402C3 second address: 4C402E0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6968D54749h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C402E0 second address: 4C40329 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov bx, FC92h 0x00000007 pushfd 0x00000008 jmp 00007F6969412EB3h 0x0000000d sub ecx, 5F336C8Eh 0x00000013 jmp 00007F6969412EB9h 0x00000018 popfd 0x00000019 popad 0x0000001a pop edx 0x0000001b pop eax 0x0000001c push eax 0x0000001d pushad 0x0000001e mov ebx, 268075A2h 0x00000023 push eax 0x00000024 push edx 0x00000025 mov eax, edi 0x00000027 rdtsc |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | RDTSC instruction interceptor: First address: 112B2E9 second address: 112B2EF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | RDTSC instruction interceptor: First address: 112B2EF second address: 112B2F9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jno 00007F6969412EA6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C40329 second address: 4C4035F instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 xchg eax, ebp 0x00000008 pushad 0x00000009 mov esi, edx 0x0000000b mov dh, 7Dh 0x0000000d popad 0x0000000e mov ebp, esp 0x00000010 jmp 00007F6968D54740h 0x00000015 push FFFFFFFEh 0x00000017 push eax 0x00000018 push edx 0x00000019 pushad 0x0000001a call 00007F6968D5473Dh 0x0000001f pop eax 0x00000020 pushad 0x00000021 popad 0x00000022 popad 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C4035F second address: 4C40365 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | RDTSC instruction interceptor: First address: 112B44C second address: 112B452 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | RDTSC instruction interceptor: First address: 112B452 second address: 112B480 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 mov eax, dword ptr [esp+04h] 0x0000000a jg 00007F6969412EB3h 0x00000010 mov eax, dword ptr [eax] 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007F6969412EADh 0x00000019 rdtsc |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | RDTSC instruction interceptor: First address: 112B480 second address: 112B49A instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push edi 0x00000004 pop edi 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp+04h], eax 0x0000000c push eax 0x0000000d push edx 0x0000000e je 00007F6968D5473Ch 0x00000014 jnl 00007F6968D54736h 0x0000001a rdtsc |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | RDTSC instruction interceptor: First address: 112B49A second address: 112B4D6 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 jbe 00007F6969412EA6h 0x00000009 pop edx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pop eax 0x0000000d call 00007F6969412EADh 0x00000012 xor cx, BEC6h 0x00000017 pop edi 0x00000018 lea ebx, dword ptr [ebp+1246025Ch] 0x0000001e mov edx, dword ptr [ebp+122D2CE3h] 0x00000024 xchg eax, ebx 0x00000025 push eax 0x00000026 push edx 0x00000027 jmp 00007F6969412EADh 0x0000002c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C40365 second address: 4C40369 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C40369 second address: 4C4036D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | RDTSC instruction interceptor: First address: 112B594 second address: 112B5AF instructions: 0x00000000 rdtsc 0x00000002 jns 00007F6968D54738h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jno 00007F6968D5473Ch 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C4036D second address: 4C40391 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 call 00007F6969412EA9h 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007F6969412EB1h 0x00000014 rdtsc |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | RDTSC instruction interceptor: First address: 112B5AF second address: 112B5B9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jno 00007F6968D54736h 0x0000000a rdtsc |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | RDTSC instruction interceptor: First address: 112B5B9 second address: 112B649 instructions: 0x00000000 rdtsc 0x00000002 je 00007F6969412EA6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c nop 0x0000000d mov edi, dword ptr [ebp+122D2F3Bh] 0x00000013 mov dword ptr [ebp+122D30EAh], esi 0x00000019 push 00000000h 0x0000001b adc di, 81FBh 0x00000020 mov dword ptr [ebp+122D31B5h], eax 0x00000026 push 75611D31h 0x0000002b push ecx 0x0000002c pushad 0x0000002d pushad 0x0000002e popad 0x0000002f jno 00007F6969412EA6h 0x00000035 popad 0x00000036 pop ecx 0x00000037 xor dword ptr [esp], 75611DB1h 0x0000003e mov edx, dword ptr [ebp+122D2DD3h] 0x00000044 push 00000003h 0x00000046 push 00000000h 0x00000048 mov esi, eax 0x0000004a push 00000003h 0x0000004c mov edi, dword ptr [ebp+122D2F67h] 0x00000052 call 00007F6969412EA9h 0x00000057 je 00007F6969412EBEh 0x0000005d jng 00007F6969412EB8h 0x00000063 jmp 00007F6969412EB2h 0x00000068 push eax 0x00000069 pushad 0x0000006a push eax 0x0000006b push edx 0x0000006c jmp 00007F6969412EB3h 0x00000071 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C40391 second address: 4C403A1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F6968D5473Ch 0x00000009 rdtsc |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | RDTSC instruction interceptor: First address: 112B649 second address: 112B666 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F6969412EA6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b pushad 0x0000000c popad 0x0000000d jng 00007F6969412EA6h 0x00000013 popad 0x00000014 popad 0x00000015 mov eax, dword ptr [esp+04h] 0x00000019 pushad 0x0000001a pushad 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | RDTSC instruction interceptor: First address: 112B666 second address: 112B66C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | RDTSC instruction interceptor: First address: 112B66C second address: 112B69E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007F6969412EB5h 0x0000000a popad 0x0000000b mov eax, dword ptr [eax] 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007F6969412EB1h 0x00000016 rdtsc |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | RDTSC instruction interceptor: First address: 112B69E second address: 112B6A4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C403A1 second address: 4C403A5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | RDTSC instruction interceptor: First address: 112B6A4 second address: 112B6AE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jns 00007F6968D54736h 0x0000000a rdtsc |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | RDTSC instruction interceptor: First address: 112B6AE second address: 112B6B2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | RDTSC instruction interceptor: First address: 112B791 second address: 112B796 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | RDTSC instruction interceptor: First address: 112B796 second address: 112B7E8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F6969412EB9h 0x00000008 push eax 0x00000009 pop eax 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e jo 00007F6969412EBEh 0x00000014 push ebx 0x00000015 jmp 00007F6969412EB6h 0x0000001a pop ebx 0x0000001b mov eax, dword ptr [esp+04h] 0x0000001f push eax 0x00000020 push edx 0x00000021 jp 00007F6969412EACh 0x00000027 rdtsc |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | RDTSC instruction interceptor: First address: 112B7E8 second address: 112B82A instructions: 0x00000000 rdtsc 0x00000002 jne 00007F6968D5474Fh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov eax, dword ptr [eax] 0x0000000c push eax 0x0000000d push edx 0x0000000e push esi 0x0000000f jmp 00007F6968D54749h 0x00000014 pop esi 0x00000015 rdtsc |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | RDTSC instruction interceptor: First address: 112B8D7 second address: 112B8DC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | RDTSC instruction interceptor: First address: 112B8DC second address: 112B917 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 add dword ptr [esp], 1B0E06AAh 0x00000010 mov ecx, ebx 0x00000012 lea ebx, dword ptr [ebp+12460270h] 0x00000018 push esi 0x00000019 movzx edx, bx 0x0000001c pop esi 0x0000001d xchg eax, ebx 0x0000001e push esi 0x0000001f jl 00007F6968D5473Ch 0x00000025 pop esi 0x00000026 push eax 0x00000027 push eax 0x00000028 push edx 0x00000029 jbe 00007F6968D5473Ch 0x0000002f jl 00007F6968D54736h 0x00000035 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C403A5 second address: 4C40413 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jmp 00007F6969412EAEh 0x0000000e mov eax, dword ptr [esp+04h] 0x00000012 jmp 00007F6969412EABh 0x00000017 mov eax, dword ptr [eax] 0x00000019 pushad 0x0000001a mov bl, 44h 0x0000001c pushad 0x0000001d pushad 0x0000001e popad 0x0000001f jmp 00007F6969412EACh 0x00000024 popad 0x00000025 popad 0x00000026 mov dword ptr [esp+04h], eax 0x0000002a pushad 0x0000002b pushfd 0x0000002c jmp 00007F6969412EB1h 0x00000031 sbb cx, 47A6h 0x00000036 jmp 00007F6969412EB1h 0x0000003b popfd 0x0000003c push eax 0x0000003d push edx 0x0000003e mov cl, 2Ah 0x00000040 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C40413 second address: 4C40422 instructions: 0x00000000 rdtsc 0x00000002 movsx ebx, si 0x00000005 pop edx 0x00000006 pop eax 0x00000007 popad 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C40422 second address: 4C40426 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C40426 second address: 4C4043D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6968D54743h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C4043D second address: 4C40478 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movsx edi, si 0x00000006 pushfd 0x00000007 jmp 00007F6969412EB0h 0x0000000c sub eax, 05A36AD8h 0x00000012 jmp 00007F6969412EABh 0x00000017 popfd 0x00000018 popad 0x00000019 pop edx 0x0000001a pop eax 0x0000001b call 00007F6969412EA9h 0x00000020 push eax 0x00000021 push edx 0x00000022 push eax 0x00000023 push edx 0x00000024 push eax 0x00000025 push edx 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C40478 second address: 4C4047C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C4047C second address: 4C40482 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C40482 second address: 4C40488 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C40488 second address: 4C4048C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C4048C second address: 4C404B8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6968D54744h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007F6968D5473Dh 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C404B8 second address: 4C404CD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6969412EB1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C404CD second address: 4C404D3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C404D3 second address: 4C4051C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr [esp+04h] 0x0000000c pushad 0x0000000d jmp 00007F6969412EB4h 0x00000012 mov cx, CE41h 0x00000016 popad 0x00000017 mov eax, dword ptr [eax] 0x00000019 push eax 0x0000001a push edx 0x0000001b pushad 0x0000001c jmp 00007F6969412EB8h 0x00000021 mov eax, 7E638121h 0x00000026 popad 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C4051C second address: 4C405C0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6968D54747h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp+04h], eax 0x0000000d jmp 00007F6968D54749h 0x00000012 pop eax 0x00000013 jmp 00007F6968D5473Eh 0x00000018 mov eax, dword ptr fs:[00000000h] 0x0000001e jmp 00007F6968D54740h 0x00000023 nop 0x00000024 pushad 0x00000025 pushfd 0x00000026 jmp 00007F6968D5473Eh 0x0000002b xor ecx, 6BD19AA8h 0x00000031 jmp 00007F6968D5473Bh 0x00000036 popfd 0x00000037 mov ebx, eax 0x00000039 popad 0x0000003a push eax 0x0000003b pushad 0x0000003c movsx edx, cx 0x0000003f push eax 0x00000040 push edx 0x00000041 pushfd 0x00000042 jmp 00007F6968D5473Ah 0x00000047 xor ah, 00000008h 0x0000004a jmp 00007F6968D5473Bh 0x0000004f popfd 0x00000050 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C405C0 second address: 4C40655 instructions: 0x00000000 rdtsc 0x00000002 mov esi, 5BB4F77Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a nop 0x0000000b jmp 00007F6969412EB2h 0x00000010 sub esp, 1Ch 0x00000013 pushad 0x00000014 pushfd 0x00000015 jmp 00007F6969412EAEh 0x0000001a sub si, 4298h 0x0000001f jmp 00007F6969412EABh 0x00000024 popfd 0x00000025 mov dx, si 0x00000028 popad 0x00000029 xchg eax, ebx 0x0000002a jmp 00007F6969412EB2h 0x0000002f push eax 0x00000030 jmp 00007F6969412EABh 0x00000035 xchg eax, ebx 0x00000036 jmp 00007F6969412EB6h 0x0000003b xchg eax, esi 0x0000003c push eax 0x0000003d push edx 0x0000003e jmp 00007F6969412EB7h 0x00000043 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C40655 second address: 4C406A6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6968D54749h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d push eax 0x0000000e pop ebx 0x0000000f pushfd 0x00000010 jmp 00007F6968D54746h 0x00000015 jmp 00007F6968D54745h 0x0000001a popfd 0x0000001b popad 0x0000001c rdtsc |