Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007DD07C | 0_2_007DD07C |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007F507D | 0_2_007F507D |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007D0072 | 0_2_007D0072 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008AC09B | 0_2_008AC09B |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008ED094 | 0_2_008ED094 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007FC05A | 0_2_007FC05A |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008490B3 | 0_2_008490B3 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008620BF | 0_2_008620BF |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008AB0B6 | 0_2_008AB0B6 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008C00B3 | 0_2_008C00B3 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007B803B | 0_2_007B803B |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008FD0CE | 0_2_008FD0CE |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008710C8 | 0_2_008710C8 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007BA02D | 0_2_007BA02D |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008E80D8 | 0_2_008E80D8 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007E9026 | 0_2_007E9026 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008950EA | 0_2_008950EA |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008550EF | 0_2_008550EF |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008960E2 | 0_2_008960E2 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0080B0EE | 0_2_0080B0EE |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008B70E4 | 0_2_008B70E4 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0090D0E3 | 0_2_0090D0E3 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008740F3 | 0_2_008740F3 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008A70FC | 0_2_008A70FC |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_009010E8 | 0_2_009010E8 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0083D0F9 | 0_2_0083D0F9 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008FF0F0 | 0_2_008FF0F0 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008BB01C | 0_2_008BB01C |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008D002D | 0_2_008D002D |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007C40DD | 0_2_007C40DD |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_00803021 | 0_2_00803021 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0084E02C | 0_2_0084E02C |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0086D02D | 0_2_0086D02D |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_00907020 | 0_2_00907020 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007C20CD | 0_2_007C20CD |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008A6033 | 0_2_008A6033 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_00887032 | 0_2_00887032 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0087F03A | 0_2_0087F03A |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_00864039 | 0_2_00864039 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_00812043 | 0_2_00812043 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0081E048 | 0_2_0081E048 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0083804A | 0_2_0083804A |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007D70B1 | 0_2_007D70B1 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007D60A4 | 0_2_007D60A4 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0081C058 | 0_2_0081C058 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_00889051 | 0_2_00889051 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007DC0A6 | 0_2_007DC0A6 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0089D052 | 0_2_0089D052 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007C90A0 | 0_2_007C90A0 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0088E057 | 0_2_0088E057 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_00883063 | 0_2_00883063 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_00879069 | 0_2_00879069 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_00829070 | 0_2_00829070 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0087E07F | 0_2_0087E07F |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_00804079 | 0_2_00804079 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008EA075 | 0_2_008EA075 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0086307B | 0_2_0086307B |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008D818D | 0_2_008D818D |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007DB17C | 0_2_007DB17C |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007E417B | 0_2_007E417B |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0080F188 | 0_2_0080F188 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_00820191 | 0_2_00820191 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0087719F | 0_2_0087719F |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0084D19F | 0_2_0084D19F |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0086B19A | 0_2_0086B19A |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0083319E | 0_2_0083319E |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008C61AD | 0_2_008C61AD |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008AD1A8 | 0_2_008AD1A8 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007DE155 | 0_2_007DE155 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008031A9 | 0_2_008031A9 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0085A1AC | 0_2_0085A1AC |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0089B1B8 | 0_2_0089B1B8 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008D41BE | 0_2_008D41BE |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008461BB | 0_2_008461BB |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008621C5 | 0_2_008621C5 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0087D1C4 | 0_2_0087D1C4 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008261C6 | 0_2_008261C6 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0086D1CE | 0_2_0086D1CE |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008E61C1 | 0_2_008E61C1 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008971D8 | 0_2_008971D8 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007BC120 | 0_2_007BC120 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008101DA | 0_2_008101DA |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008291DE | 0_2_008291DE |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008401DA | 0_2_008401DA |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008DB1E6 | 0_2_008DB1E6 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007EA10E | 0_2_007EA10E |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008871FB | 0_2_008871FB |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_009071E4 | 0_2_009071E4 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007C1107 | 0_2_007C1107 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008D11F6 | 0_2_008D11F6 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008A01F6 | 0_2_008A01F6 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0083B103 | 0_2_0083B103 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008A8109 | 0_2_008A8109 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_00825106 | 0_2_00825106 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008F9104 | 0_2_008F9104 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008D3103 | 0_2_008D3103 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0080E10F | 0_2_0080E10F |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007B71E1 | 0_2_007B71E1 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008A212E | 0_2_008A212E |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008B212C | 0_2_008B212C |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0081A12D | 0_2_0081A12D |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008B4124 | 0_2_008B4124 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0085B136 | 0_2_0085B136 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_00902123 | 0_2_00902123 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_00848133 | 0_2_00848133 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0090C128 | 0_2_0090C128 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008D2134 | 0_2_008D2134 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0084513F | 0_2_0084513F |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0081B13C | 0_2_0081B13C |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008CD14D | 0_2_008CD14D |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008D614E | 0_2_008D614E |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0091C154 | 0_2_0091C154 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0083C14F | 0_2_0083C14F |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_00854162 | 0_2_00854162 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007C6196 | 0_2_007C6196 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0087C16D | 0_2_0087C16D |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0082A173 | 0_2_0082A173 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008F4172 | 0_2_008F4172 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007ED27E | 0_2_007ED27E |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_00835283 | 0_2_00835283 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_00807281 | 0_2_00807281 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0083628B | 0_2_0083628B |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007C8276 | 0_2_007C8276 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0081628B | 0_2_0081628B |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0082F28D | 0_2_0082F28D |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0080B296 | 0_2_0080B296 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0086A291 | 0_2_0086A291 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0084F2A9 | 0_2_0084F2A9 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007E224E | 0_2_007E224E |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008CB2BD | 0_2_008CB2BD |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007CF244 | 0_2_007CF244 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008762BF | 0_2_008762BF |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008C42C9 | 0_2_008C42C9 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007EC238 | 0_2_007EC238 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0090E2D6 | 0_2_0090E2D6 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007D5235 | 0_2_007D5235 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0090A2D8 | 0_2_0090A2D8 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007CD235 | 0_2_007CD235 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008EF2C2 | 0_2_008EF2C2 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008D22D8 | 0_2_008D22D8 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007E0229 | 0_2_007E0229 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008442D8 | 0_2_008442D8 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_009212CD | 0_2_009212CD |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_009102F1 | 0_2_009102F1 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008252E4 | 0_2_008252E4 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008BF2E1 | 0_2_008BF2E1 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008AE2E7 | 0_2_008AE2E7 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0088F2E6 | 0_2_0088F2E6 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0090B2EA | 0_2_0090B2EA |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_009002EC | 0_2_009002EC |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007BD205 | 0_2_007BD205 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008DA208 | 0_2_008DA208 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_00852203 | 0_2_00852203 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0083120A | 0_2_0083120A |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008ED212 | 0_2_008ED212 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007C42DC | 0_2_007C42DC |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_00824223 | 0_2_00824223 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0084C223 | 0_2_0084C223 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0080A22D | 0_2_0080A22D |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008E5238 | 0_2_008E5238 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007F82C7 | 0_2_007F82C7 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007EB2C5 | 0_2_007EB2C5 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008F5232 | 0_2_008F5232 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0092622D | 0_2_0092622D |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_00848245 | 0_2_00848245 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0085C247 | 0_2_0085C247 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_00805243 | 0_2_00805243 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0088D242 | 0_2_0088D242 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0084A248 | 0_2_0084A248 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0083024E | 0_2_0083024E |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_00881258 | 0_2_00881258 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008AF253 | 0_2_008AF253 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0083E259 | 0_2_0083E259 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_00898252 | 0_2_00898252 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0081D262 | 0_2_0081D262 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008C526F | 0_2_008C526F |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0085926F | 0_2_0085926F |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007F0289 | 0_2_007F0289 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0087A27F | 0_2_0087A27F |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0084127E | 0_2_0084127E |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007BF287 | 0_2_007BF287 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_00827383 | 0_2_00827383 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0091E393 | 0_2_0091E393 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0082D38A | 0_2_0082D38A |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_00921382 | 0_2_00921382 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_00850391 | 0_2_00850391 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008E13AE | 0_2_008E13AE |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008E73AC | 0_2_008E73AC |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_009033B9 | 0_2_009033B9 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_009053BE | 0_2_009053BE |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008BE3BC | 0_2_008BE3BC |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007BA341 | 0_2_007BA341 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008923C8 | 0_2_008923C8 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007E7339 | 0_2_007E7339 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0087E3E6 | 0_2_0087E3E6 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008133E4 | 0_2_008133E4 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008993EF | 0_2_008993EF |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008613EB | 0_2_008613EB |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008A73E4 | 0_2_008A73E4 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007C630D | 0_2_007C630D |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008C43FA | 0_2_008C43FA |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007D7306 | 0_2_007D7306 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008B03F6 | 0_2_008B03F6 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007E6301 | 0_2_007E6301 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_00861302 | 0_2_00861302 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_00809306 | 0_2_00809306 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008D5303 | 0_2_008D5303 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0088531B | 0_2_0088531B |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_00875311 | 0_2_00875311 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008EC316 | 0_2_008EC316 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007B63E1 | 0_2_007B63E1 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0084B319 | 0_2_0084B319 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0088C315 | 0_2_0088C315 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0085831B | 0_2_0085831B |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0088B317 | 0_2_0088B317 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008C732F | 0_2_008C732F |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007C73D8 | 0_2_007C73D8 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_00890321 | 0_2_00890321 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_00868332 | 0_2_00868332 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007E83C8 | 0_2_007E83C8 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0090632D | 0_2_0090632D |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0089534D | 0_2_0089534D |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008FC34B | 0_2_008FC34B |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0082C34E | 0_2_0082C34E |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007B63B5 | 0_2_007B63B5 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008E2359 | 0_2_008E2359 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007D4398 | 0_2_007D4398 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008CE366 | 0_2_008CE366 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0087036B | 0_2_0087036B |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007E9391 | 0_2_007E9391 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_00843372 | 0_2_00843372 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008DD37A | 0_2_008DD37A |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008FA378 | 0_2_008FA378 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0080837F | 0_2_0080837F |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_00907495 | 0_2_00907495 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0086948C | 0_2_0086948C |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_00822489 | 0_2_00822489 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0082948E | 0_2_0082948E |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008B649B | 0_2_008B649B |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007DE469 | 0_2_007DE469 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007F646A | 0_2_007F646A |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008DE498 | 0_2_008DE498 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_00865491 | 0_2_00865491 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0086449E | 0_2_0086449E |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007EE465 | 0_2_007EE465 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008C64AC | 0_2_008C64AC |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007EC456 | 0_2_007EC456 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008B24A5 | 0_2_008B24A5 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0084E4C4 | 0_2_0084E4C4 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007D743C | 0_2_007D743C |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0080D4CC | 0_2_0080D4CC |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008D74C1 | 0_2_008D74C1 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008B74C5 | 0_2_008B74C5 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008154D0 | 0_2_008154D0 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008EA4D9 | 0_2_008EA4D9 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008D44D7 | 0_2_008D44D7 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007ED425 | 0_2_007ED425 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008564D8 | 0_2_008564D8 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008BD4D4 | 0_2_008BD4D4 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007BC41B | 0_2_007BC41B |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007E5416 | 0_2_007E5416 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008E04FC | 0_2_008E04FC |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008A14F9 | 0_2_008A14F9 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008034F4 | 0_2_008034F4 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008144F6 | 0_2_008144F6 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008DA4F6 | 0_2_008DA4F6 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008FB40E | 0_2_008FB40E |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_00819404 | 0_2_00819404 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_00882402 | 0_2_00882402 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0086B40A | 0_2_0086B40A |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0087B415 | 0_2_0087B415 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008A0418 | 0_2_008A0418 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007D64E8 | 0_2_007D64E8 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0083B415 | 0_2_0083B415 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0088641E | 0_2_0088641E |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008FE417 | 0_2_008FE417 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007E34E7 | 0_2_007E34E7 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_00812424 | 0_2_00812424 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0087842E | 0_2_0087842E |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007F44D0 | 0_2_007F44D0 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0083242C | 0_2_0083242C |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_00879435 | 0_2_00879435 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007D04CE | 0_2_007D04CE |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007FD4CB | 0_2_007FD4CB |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008AC433 | 0_2_008AC433 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008F6436 | 0_2_008F6436 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008A2448 | 0_2_008A2448 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007DD4B3 | 0_2_007DD4B3 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_00845454 | 0_2_00845454 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_00920444 | 0_2_00920444 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007BE4AC | 0_2_007BE4AC |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007D14A1 | 0_2_007D14A1 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008A8455 | 0_2_008A8455 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008E4460 | 0_2_008E4460 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_00849473 | 0_2_00849473 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007B9576 | 0_2_007B9576 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007C5571 | 0_2_007C5571 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008E3581 | 0_2_008E3581 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008EE59D | 0_2_008EE59D |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007BC56D | 0_2_007BC56D |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007EA567 | 0_2_007EA567 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_00818598 | 0_2_00818598 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0081D59A | 0_2_0081D59A |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0091558C | 0_2_0091558C |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007C155D | 0_2_007C155D |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0083C5A6 | 0_2_0083C5A6 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007C3553 | 0_2_007C3553 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008F75BE | 0_2_008F75BE |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007CE548 | 0_2_007CE548 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008E65BA | 0_2_008E65BA |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0090A5A4 | 0_2_0090A5A4 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008575BD | 0_2_008575BD |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007C0538 | 0_2_007C0538 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0081B5C8 | 0_2_0081B5C8 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_009015DB | 0_2_009015DB |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008BC5DB | 0_2_008BC5DB |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008875DE | 0_2_008875DE |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008CF5D4 | 0_2_008CF5D4 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007D2527 | 0_2_007D2527 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008425DB | 0_2_008425DB |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008475E6 | 0_2_008475E6 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007F3515 | 0_2_007F3515 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008DF5E7 | 0_2_008DF5E7 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0082B5EE | 0_2_0082B5EE |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007C950D | 0_2_007C950D |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007E450F | 0_2_007E450F |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0089B5FA | 0_2_0089B5FA |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008B25F8 | 0_2_008B25F8 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008605F1 | 0_2_008605F1 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0088C5FF | 0_2_0088C5FF |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008C55F0 | 0_2_008C55F0 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008FC5F3 | 0_2_008FC5F3 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008335FE | 0_2_008335FE |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008FF50B | 0_2_008FF50B |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0083D506 | 0_2_0083D506 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0088A502 | 0_2_0088A502 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0089E505 | 0_2_0089E505 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008B451B | 0_2_008B451B |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008CC51D | 0_2_008CC51D |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0082A516 | 0_2_0082A516 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008F451B | 0_2_008F451B |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0080E518 | 0_2_0080E518 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0080A51A | 0_2_0080A51A |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008AA516 | 0_2_008AA516 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_00811520 | 0_2_00811520 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0083F522 | 0_2_0083F522 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0087C524 | 0_2_0087C524 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008A452F | 0_2_008A452F |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_00802528 | 0_2_00802528 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_00889524 | 0_2_00889524 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007B75AF | 0_2_007B75AF |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008EB551 | 0_2_008EB551 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008D856D | 0_2_008D856D |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008D6565 | 0_2_008D6565 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_00851569 | 0_2_00851569 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008B0565 | 0_2_008B0565 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_00812573 | 0_2_00812573 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008EC57A | 0_2_008EC57A |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0080657B | 0_2_0080657B |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_00825686 | 0_2_00825686 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0085B68C | 0_2_0085B68C |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008D0684 | 0_2_008D0684 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007F7674 | 0_2_007F7674 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0085268E | 0_2_0085268E |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008A4681 | 0_2_008A4681 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007EB66F | 0_2_007EB66F |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0086D694 | 0_2_0086D694 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_00844697 | 0_2_00844697 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007BB66C | 0_2_007BB66C |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0085A692 | 0_2_0085A692 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007F265A | 0_2_007F265A |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008166A9 | 0_2_008166A9 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0085E6AD | 0_2_0085E6AD |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008306AA | 0_2_008306AA |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008816A4 | 0_2_008816A4 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0086E6A8 | 0_2_0086E6A8 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0087C6B3 | 0_2_0087C6B3 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0084D6BC | 0_2_0084D6BC |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008246B9 | 0_2_008246B9 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008486BA | 0_2_008486BA |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008986B6 | 0_2_008986B6 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008756C7 | 0_2_008756C7 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008506C4 | 0_2_008506C4 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0080F6C5 | 0_2_0080F6C5 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008DC6CA | 0_2_008DC6CA |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0087A6CC | 0_2_0087A6CC |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008F86C3 | 0_2_008F86C3 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007AE637 | 0_2_007AE637 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007F1632 | 0_2_007F1632 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007D561D | 0_2_007D561D |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008C36EC | 0_2_008C36EC |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008CB6EC | 0_2_008CB6EC |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008586E4 | 0_2_008586E4 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008766E4 | 0_2_008766E4 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008F16E8 | 0_2_008F16E8 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007CA611 | 0_2_007CA611 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008136EF | 0_2_008136EF |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007FE60C | 0_2_007FE60C |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0084B6F3 | 0_2_0084B6F3 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008906F3 | 0_2_008906F3 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007F8602 | 0_2_007F8602 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008186FC | 0_2_008186FC |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008686F8 | 0_2_008686F8 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008FD606 | 0_2_008FD606 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0084F608 | 0_2_0084F608 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0090461F | 0_2_0090461F |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008F361C | 0_2_008F361C |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008B362D | 0_2_008B362D |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007D46D4 | 0_2_007D46D4 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_00801629 | 0_2_00801629 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008EF627 | 0_2_008EF627 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0080B62F | 0_2_0080B62F |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007C46CE | 0_2_007C46CE |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007CC6C5 | 0_2_007CC6C5 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0087063D | 0_2_0087063D |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0080C647 | 0_2_0080C647 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008A5640 | 0_2_008A5640 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007FA6A7 | 0_2_007FA6A7 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0085365D | 0_2_0085365D |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0091464E | 0_2_0091464E |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008F5669 | 0_2_008F5669 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_00867661 | 0_2_00867661 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007E0695 | 0_2_007E0695 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007D6691 | 0_2_007D6691 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_00859668 | 0_2_00859668 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0082666D | 0_2_0082666D |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0084C674 | 0_2_0084C674 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007BA68A | 0_2_007BA68A |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_00840677 | 0_2_00840677 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007CF684 | 0_2_007CF684 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007C7682 | 0_2_007C7682 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_00845782 | 0_2_00845782 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007D9774 | 0_2_007D9774 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0083F789 | 0_2_0083F789 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008C8787 | 0_2_008C8787 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_00823793 | 0_2_00823793 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_00817797 | 0_2_00817797 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008AA7A8 | 0_2_008AA7A8 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008F97AD | 0_2_008F97AD |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008D97AE | 0_2_008D97AE |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0087E7AD | 0_2_0087E7AD |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007C074C | 0_2_007C074C |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007BF748 | 0_2_007BF748 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007C974A | 0_2_007C974A |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007B7741 | 0_2_007B7741 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_009247DA | 0_2_009247DA |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008A07C0 | 0_2_008A07C0 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007ED729 | 0_2_007ED729 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008227D5 | 0_2_008227D5 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008787D0 | 0_2_008787D0 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008D77D5 | 0_2_008D77D5 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007E771C | 0_2_007E771C |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008437E2 | 0_2_008437E2 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0087D7E1 | 0_2_0087D7E1 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008FC7E2 | 0_2_008FC7E2 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007C87FD | 0_2_007C87FD |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008EA70A | 0_2_008EA70A |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007F27FA | 0_2_007F27FA |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007C07F5 | 0_2_007C07F5 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0083C71D | 0_2_0083C71D |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0086F724 | 0_2_0086F724 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0091F720 | 0_2_0091F720 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007D57CE | 0_2_007D57CE |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_00857733 | 0_2_00857733 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007D27C7 | 0_2_007D27C7 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007FC7BD | 0_2_007FC7BD |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0089274B | 0_2_0089274B |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007B67B0 | 0_2_007B67B0 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008E1745 | 0_2_008E1745 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_00821754 | 0_2_00821754 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008D5757 | 0_2_008D5757 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0090674F | 0_2_0090674F |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007F079C | 0_2_007F079C |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0088F778 | 0_2_0088F778 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_00810770 | 0_2_00810770 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007D878B | 0_2_007D878B |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0080777A | 0_2_0080777A |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_00885773 | 0_2_00885773 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007E5875 | 0_2_007E5875 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008DD89C | 0_2_008DD89C |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007E386C | 0_2_007E386C |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008AC892 | 0_2_008AC892 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007D0864 | 0_2_007D0864 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008A2891 | 0_2_008A2891 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0086289A | 0_2_0086289A |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008A38AA | 0_2_008A38AA |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0081E8AC | 0_2_0081E8AC |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008F28BF | 0_2_008F28BF |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008008C4 | 0_2_008008C4 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_009088D8 | 0_2_009088D8 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007BC836 | 0_2_007BC836 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008DA8C2 | 0_2_008DA8C2 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008A88DF | 0_2_008A88DF |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008E08D6 | 0_2_008E08D6 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008D38D4 | 0_2_008D38D4 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008FB8D2 | 0_2_008FB8D2 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_007EC81B | 0_2_007EC81B |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008D78E4 | 0_2_008D78E4 |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_008C48FF | 0_2_008C48FF |
Source: C:\Users\user\Desktop\random.exe | Code function: 0_2_0089A8FE | 0_2_0089A8FE |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 92A42C second address: 92A432 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 92A432 second address: 92A436 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 92A436 second address: 92A450 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jc 00007FF008FD8866h 0x0000000d jbe 00007FF008FD8866h 0x00000013 jno 00007FF008FD8866h 0x00000019 popad 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 92A749 second address: 92A74D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 92AA1D second address: 92AA35 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF008FD8874h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 92EB49 second address: 7AE71F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 xor dword ptr [esp], 7E309EDAh 0x0000000c jmp 00007FF008B8948Bh 0x00000011 push dword ptr [ebp+13B9000Dh] 0x00000017 mov edx, dword ptr [ebp+13B93344h] 0x0000001d call dword ptr [ebp+13B91D21h] 0x00000023 pushad 0x00000024 jmp 00007FF008B89499h 0x00000029 xor eax, eax 0x0000002b or dword ptr [ebp+13B91B11h], eax 0x00000031 jnl 00007FF008B89494h 0x00000037 mov edx, dword ptr [esp+28h] 0x0000003b jmp 00007FF008B8948Ch 0x00000040 mov dword ptr [ebp+13B93370h], eax 0x00000046 pushad 0x00000047 push esi 0x00000048 mov bx, di 0x0000004b pop ecx 0x0000004c add bx, 0ECDh 0x00000051 popad 0x00000052 sub dword ptr [ebp+13B91B11h], ecx 0x00000058 mov esi, 0000003Ch 0x0000005d pushad 0x0000005e xor dword ptr [ebp+13B91B11h], edi 0x00000064 mov edi, dword ptr [ebp+13B93544h] 0x0000006a popad 0x0000006b add esi, dword ptr [esp+24h] 0x0000006f jmp 00007FF008B89498h 0x00000074 lodsw 0x00000076 cld 0x00000077 jmp 00007FF008B89491h 0x0000007c add eax, dword ptr [esp+24h] 0x00000080 jg 00007FF008B89487h 0x00000086 mov ebx, dword ptr [esp+24h] 0x0000008a pushad 0x0000008b movzx edi, di 0x0000008e mov cl, al 0x00000090 popad 0x00000091 jno 00007FF008B8949Eh 0x00000097 push eax 0x00000098 pushad 0x00000099 push eax 0x0000009a push edx 0x0000009b jns 00007FF008B89486h 0x000000a1 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 92EBD2 second address: 92EBD8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 92EBD8 second address: 92EBDC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 92ED07 second address: 92ED17 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FF008FD886Bh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 92EE5D second address: 92EEB4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 popad 0x00000007 jmp 00007FF008B89493h 0x0000000c popad 0x0000000d mov eax, dword ptr [esp+04h] 0x00000011 jnc 00007FF008B894B0h 0x00000017 mov eax, dword ptr [eax] 0x00000019 push eax 0x0000001a push edx 0x0000001b push ecx 0x0000001c push edx 0x0000001d pop edx 0x0000001e pop ecx 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 92EEB4 second address: 92EF11 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF008FD8879h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp+04h], eax 0x0000000d jnc 00007FF008FD8870h 0x00000013 pop eax 0x00000014 mov si, E5C5h 0x00000018 lea ebx, dword ptr [ebp+13D13A7Eh] 0x0000001e jmp 00007FF008FD8870h 0x00000023 xchg eax, ebx 0x00000024 jl 00007FF008FD886Ah 0x0000002a push edi 0x0000002b pushad 0x0000002c popad 0x0000002d pop edi 0x0000002e push eax 0x0000002f pushad 0x00000030 push eax 0x00000031 push edx 0x00000032 pushad 0x00000033 popad 0x00000034 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 92F049 second address: 92F04E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 92F04E second address: 92F055 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 92F055 second address: 92F0AA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 jmp 00007FF008B89494h 0x0000000d mov eax, dword ptr [esp+04h] 0x00000011 ja 00007FF008B89492h 0x00000017 mov eax, dword ptr [eax] 0x00000019 jmp 00007FF008B89494h 0x0000001e mov dword ptr [esp+04h], eax 0x00000022 jnp 00007FF008B89494h 0x00000028 pushad 0x00000029 push eax 0x0000002a push edx 0x0000002b rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 92F0AA second address: 92F0B0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 94FA32 second address: 94FA41 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FF008B8948Ah 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 91A0A6 second address: 91A0AC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 91A0AC second address: 91A0B6 instructions: 0x00000000 rdtsc 0x00000002 ja 00007FF008B89486h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 94D9AB second address: 94D9BC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF008FD886Dh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 94D9BC second address: 94D9C0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 94D9C0 second address: 94D9D4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007FF008FD886Ah 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 94D9D4 second address: 94D9DE instructions: 0x00000000 rdtsc 0x00000002 jnl 00007FF008B89486h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 94DCCE second address: 94DCEE instructions: 0x00000000 rdtsc 0x00000002 jp 00007FF008FD8866h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007FF008FD8876h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 94DCEE second address: 94DCFA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jl 00007FF008B89486h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 94DCFA second address: 94DCFE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 94DE73 second address: 94DE7D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007FF008B89486h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 94DE7D second address: 94DE83 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 94E23E second address: 94E246 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 push esi 0x00000007 pop esi 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 94E246 second address: 94E257 instructions: 0x00000000 rdtsc 0x00000002 jng 00007FF008FD8866h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push ecx 0x0000000d pushad 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 94E392 second address: 94E39D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007FF008B89486h 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 94E4FD second address: 94E52D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jbe 00007FF008FD8866h 0x0000000b jne 00007FF008FD8866h 0x00000011 popad 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007FF008FD8876h 0x00000019 jno 00007FF008FD8866h 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 94E52D second address: 94E537 instructions: 0x00000000 rdtsc 0x00000002 jns 00007FF008B89486h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 94E537 second address: 94E544 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 94E544 second address: 94E561 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007FF008B89486h 0x0000000a jmp 00007FF008B8948Ch 0x0000000f js 00007FF008B89486h 0x00000015 popad 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 94E6B5 second address: 94E6B9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 94E6B9 second address: 94E6C5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jo 00007FF008B89486h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 94E6C5 second address: 94E6CB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 924296 second address: 9242E6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF008B8948Ch 0x00000007 push edi 0x00000008 jnc 00007FF008B89486h 0x0000000e pop edi 0x0000000f pop edx 0x00000010 pop eax 0x00000011 push edx 0x00000012 jp 00007FF008B8949Bh 0x00000018 push eax 0x00000019 push edx 0x0000001a jmp 00007FF008B89498h 0x0000001f pushad 0x00000020 popad 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9242E6 second address: 9242EA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 94EB04 second address: 94EB08 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 94F146 second address: 94F14C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 94F14C second address: 94F155 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 94F155 second address: 94F159 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 94F2B6 second address: 94F2BA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 94F597 second address: 94F59D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 94F59D second address: 94F5C9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF008B8948Fh 0x00000007 jne 00007FF008B89486h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007FF008B8948Fh 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 94F5C9 second address: 94F5CD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 94F5CD second address: 94F5D1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 94F5D1 second address: 94F5D9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 94F5D9 second address: 94F5EA instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 jnp 00007FF008B89486h 0x00000009 pop ecx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 94F5EA second address: 94F5F8 instructions: 0x00000000 rdtsc 0x00000002 jc 00007FF008FD8866h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push edi 0x0000000d pop edi 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 94F5F8 second address: 94F602 instructions: 0x00000000 rdtsc 0x00000002 jne 00007FF008B89486h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 951EBE second address: 951EC2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 951EC2 second address: 951ED4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c jne 00007FF008B89486h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 951ED4 second address: 951EDA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 952FDC second address: 952FF1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007FF008B8948Eh 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 95A292 second address: 95A298 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 95A298 second address: 95A29C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 95A29C second address: 95A2B4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FF008FD8870h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 959A31 second address: 959A5E instructions: 0x00000000 rdtsc 0x00000002 jns 00007FF008B89486h 0x00000008 jbe 00007FF008B89486h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 push edx 0x00000012 push ecx 0x00000013 pushad 0x00000014 popad 0x00000015 pop ecx 0x00000016 jmp 00007FF008B89497h 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 95A122 second address: 95A128 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 95A128 second address: 95A12E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 95A12E second address: 95A136 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push ecx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 95D5BA second address: 95D5BE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 95D5BE second address: 95D5E0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007FF008FD886Ah 0x0000000e pop edx 0x0000000f mov eax, dword ptr [esp+04h] 0x00000013 push edi 0x00000014 pushad 0x00000015 jo 00007FF008FD8866h 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 95D5E0 second address: 95D608 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edi 0x00000006 mov eax, dword ptr [eax] 0x00000008 jmp 00007FF008B89492h 0x0000000d mov dword ptr [esp+04h], eax 0x00000011 jg 00007FF008B89498h 0x00000017 push eax 0x00000018 push edx 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 95D608 second address: 95D60C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 95D60C second address: 95D610 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 95D610 second address: 95D638 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop eax 0x00000007 mov esi, dword ptr [ebp+13B93464h] 0x0000000d call 00007FF008FD8869h 0x00000012 jmp 00007FF008FD886Ch 0x00000017 push eax 0x00000018 push eax 0x00000019 push edx 0x0000001a pushad 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 95D638 second address: 95D63F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 95D63F second address: 95D645 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 95D645 second address: 95D663 instructions: 0x00000000 rdtsc 0x00000002 jc 00007FF008B89486h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov eax, dword ptr [esp+04h] 0x00000010 jg 00007FF008B89492h 0x00000016 jns 00007FF008B8948Ch 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 95D663 second address: 95D66E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 mov eax, dword ptr [eax] 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 95D66E second address: 95D68D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF008B89498h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push ebx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 95D7DC second address: 95D7E1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 95D7E1 second address: 95D7E7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 95D7E7 second address: 95D7EB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 95D9EE second address: 95DA06 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF008B8948Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b pushad 0x0000000c pushad 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 95E227 second address: 95E231 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 ja 00007FF008FD8866h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 95E231 second address: 95E240 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d push edi 0x0000000e pop edi 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 95E240 second address: 95E24A instructions: 0x00000000 rdtsc 0x00000002 jo 00007FF008FD8866h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 95E618 second address: 95E61E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 95E61E second address: 95E622 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 95E622 second address: 95E644 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FF008B89497h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 95E732 second address: 95E74B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF008FD886Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jbe 00007FF008FD8874h 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 95E80D second address: 95E81F instructions: 0x00000000 rdtsc 0x00000002 js 00007FF008B89486h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jns 00007FF008B89486h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 95E81F second address: 95E823 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 95E8C6 second address: 95E8DC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pushad 0x00000006 push eax 0x00000007 pop eax 0x00000008 jg 00007FF008B89486h 0x0000000e popad 0x0000000f popad 0x00000010 push eax 0x00000011 pushad 0x00000012 push eax 0x00000013 push edx 0x00000014 pushad 0x00000015 popad 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 95E8DC second address: 95E8EA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jnl 00007FF008FD8866h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 95E989 second address: 95E98E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 95E98E second address: 95E9B9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007FF008FD8866h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d mov dword ptr [esp], eax 0x00000010 mov si, dx 0x00000013 push eax 0x00000014 push esi 0x00000015 pushad 0x00000016 jmp 00007FF008FD8873h 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 95EF1C second address: 95EF26 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jns 00007FF008B89486h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 95EF26 second address: 95EF74 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF008FD8876h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b nop 0x0000000c push esi 0x0000000d and edi, 671C1B21h 0x00000013 pop edi 0x00000014 push 00000000h 0x00000016 or dword ptr [ebp+13B92530h], ebx 0x0000001c xor edi, dword ptr [ebp+13B9268Fh] 0x00000022 push 00000000h 0x00000024 add si, DB31h 0x00000029 push eax 0x0000002a pushad 0x0000002b jmp 00007FF008FD886Eh 0x00000030 push eax 0x00000031 push edx 0x00000032 push edi 0x00000033 pop edi 0x00000034 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 95FA00 second address: 95FA0A instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FF008B89486h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 95FA0A second address: 95FA10 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 95FA10 second address: 95FA14 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 960954 second address: 960996 instructions: 0x00000000 rdtsc 0x00000002 ja 00007FF008FD8866h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b mov dword ptr [esp], eax 0x0000000e push 00000000h 0x00000010 push ecx 0x00000011 call 00007FF008FD8868h 0x00000016 pop ecx 0x00000017 mov dword ptr [esp+04h], ecx 0x0000001b add dword ptr [esp+04h], 00000015h 0x00000023 inc ecx 0x00000024 push ecx 0x00000025 ret 0x00000026 pop ecx 0x00000027 ret 0x00000028 push 00000000h 0x0000002a mov esi, dword ptr [ebp+13B9534Dh] 0x00000030 push 00000000h 0x00000032 mov dword ptr [ebp+13D2E4AAh], edi 0x00000038 xchg eax, ebx 0x00000039 push eax 0x0000003a push edx 0x0000003b push ebx 0x0000003c pushad 0x0000003d popad 0x0000003e pop ebx 0x0000003f rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 960996 second address: 96099B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 96099B second address: 9609AF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push ebx 0x0000000b pushad 0x0000000c je 00007FF008FD8866h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9614D9 second address: 9614DF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9611B1 second address: 9611BA instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9614DF second address: 9614E4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9611BA second address: 9611CE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 popad 0x00000006 push eax 0x00000007 push ebx 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007FF008FD886Ah 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9614E4 second address: 9614EA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9611CE second address: 9611D2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9614EA second address: 9614EE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 961FE3 second address: 961FE7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 962A65 second address: 962A80 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF008B89497h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9627FD second address: 962802 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 962802 second address: 962808 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 963FE9 second address: 96404C instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FF008FD886Ch 0x00000008 pop edx 0x00000009 pop eax 0x0000000a nop 0x0000000b push 00000000h 0x0000000d push edx 0x0000000e call 00007FF008FD8868h 0x00000013 pop edx 0x00000014 mov dword ptr [esp+04h], edx 0x00000018 add dword ptr [esp+04h], 00000017h 0x00000020 inc edx 0x00000021 push edx 0x00000022 ret 0x00000023 pop edx 0x00000024 ret 0x00000025 and esi, dword ptr [ebp+13B95359h] 0x0000002b push 00000000h 0x0000002d mov esi, dword ptr [ebp+13B9340Ch] 0x00000033 push 00000000h 0x00000035 jmp 00007FF008FD8877h 0x0000003a xchg eax, ebx 0x0000003b pushad 0x0000003c pushad 0x0000003d push eax 0x0000003e pop eax 0x0000003f pushad 0x00000040 popad 0x00000041 popad 0x00000042 push eax 0x00000043 push edx 0x00000044 pushad 0x00000045 popad 0x00000046 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 96404C second address: 964077 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF008B8948Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007FF008B89495h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 964077 second address: 96407B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 96407B second address: 964081 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 962808 second address: 96280C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9659F7 second address: 9659FD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 96333B second address: 96333F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 966AC3 second address: 966B29 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop eax 0x00000006 push eax 0x00000007 push esi 0x00000008 jmp 00007FF008B8948Eh 0x0000000d pop esi 0x0000000e nop 0x0000000f mov dword ptr [ebp+13B9262Eh], edx 0x00000015 or edi, 5D537802h 0x0000001b push 00000000h 0x0000001d ja 00007FF008B89487h 0x00000023 push 00000000h 0x00000025 push 00000000h 0x00000027 push edi 0x00000028 call 00007FF008B89488h 0x0000002d pop edi 0x0000002e mov dword ptr [esp+04h], edi 0x00000032 add dword ptr [esp+04h], 00000017h 0x0000003a inc edi 0x0000003b push edi 0x0000003c ret 0x0000003d pop edi 0x0000003e ret 0x0000003f pushad 0x00000040 jmp 00007FF008B8948Ch 0x00000045 popad 0x00000046 push eax 0x00000047 je 00007FF008B89494h 0x0000004d pushad 0x0000004e push eax 0x0000004f push edx 0x00000050 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 96333F second address: 963345 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 966B29 second address: 966B2F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 963345 second address: 963368 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FF008FD8875h 0x00000008 pushad 0x00000009 popad 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push ebx 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 pop eax 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 96A9AC second address: 96A9BF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF008B8948Fh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 96A9BF second address: 96A9C3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 96A9C3 second address: 96AA23 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jnc 00007FF008B8948Ah 0x0000000f nop 0x00000010 push eax 0x00000011 mov edi, dword ptr [ebp+13B93294h] 0x00000017 pop ebx 0x00000018 push 00000000h 0x0000001a mov di, 1AE6h 0x0000001e push 00000000h 0x00000020 push 00000000h 0x00000022 push eax 0x00000023 call 00007FF008B89488h 0x00000028 pop eax 0x00000029 mov dword ptr [esp+04h], eax 0x0000002d add dword ptr [esp+04h], 00000018h 0x00000035 inc eax 0x00000036 push eax 0x00000037 ret 0x00000038 pop eax 0x00000039 ret 0x0000003a mov dword ptr [ebp+13B91BECh], edx 0x00000040 xchg eax, esi 0x00000041 push ebx 0x00000042 push eax 0x00000043 push edx 0x00000044 jmp 00007FF008B89492h 0x00000049 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 96B9BC second address: 96B9C2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 96B9C2 second address: 96B9C8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 96B9C8 second address: 96BA54 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF008FD8873h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b nop 0x0000000c push 00000000h 0x0000000e push ebp 0x0000000f call 00007FF008FD8868h 0x00000014 pop ebp 0x00000015 mov dword ptr [esp+04h], ebp 0x00000019 add dword ptr [esp+04h], 00000019h 0x00000021 inc ebp 0x00000022 push ebp 0x00000023 ret 0x00000024 pop ebp 0x00000025 ret 0x00000026 clc 0x00000027 add ebx, dword ptr [ebp+13B93544h] 0x0000002d push 00000000h 0x0000002f push 00000000h 0x00000031 push ebx 0x00000032 call 00007FF008FD8868h 0x00000037 pop ebx 0x00000038 mov dword ptr [esp+04h], ebx 0x0000003c add dword ptr [esp+04h], 0000001Ch 0x00000044 inc ebx 0x00000045 push ebx 0x00000046 ret 0x00000047 pop ebx 0x00000048 ret 0x00000049 movsx ebx, di 0x0000004c push 00000000h 0x0000004e jmp 00007FF008FD8874h 0x00000053 xchg eax, esi 0x00000054 push eax 0x00000055 push edx 0x00000056 push eax 0x00000057 push edx 0x00000058 jbe 00007FF008FD8866h 0x0000005e rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 96BA54 second address: 96BA62 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF008B8948Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 96BA62 second address: 96BA68 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 96BA68 second address: 96BA6C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 96BA6C second address: 96BA7A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push ecx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 96BA7A second address: 96BA7F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 967C25 second address: 967CDC instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 jmp 00007FF008FD886Eh 0x0000000c nop 0x0000000d push dword ptr fs:[00000000h] 0x00000014 push 00000000h 0x00000016 push ebp 0x00000017 call 00007FF008FD8868h 0x0000001c pop ebp 0x0000001d mov dword ptr [esp+04h], ebp 0x00000021 add dword ptr [esp+04h], 0000001Ah 0x00000029 inc ebp 0x0000002a push ebp 0x0000002b ret 0x0000002c pop ebp 0x0000002d ret 0x0000002e mov dword ptr [ebp+13D100EBh], eax 0x00000034 mov dword ptr fs:[00000000h], esp 0x0000003b mov bx, D56Ch 0x0000003f mov eax, dword ptr [ebp+13B90AA9h] 0x00000045 push 00000000h 0x00000047 push esi 0x00000048 call 00007FF008FD8868h 0x0000004d pop esi 0x0000004e mov dword ptr [esp+04h], esi 0x00000052 add dword ptr [esp+04h], 0000001Ah 0x0000005a inc esi 0x0000005b push esi 0x0000005c ret 0x0000005d pop esi 0x0000005e ret 0x0000005f mov bl, ah 0x00000061 push FFFFFFFFh 0x00000063 push ebx 0x00000064 jmp 00007FF008FD886Fh 0x00000069 pop edi 0x0000006a nop 0x0000006b jnc 00007FF008FD887Eh 0x00000071 push eax 0x00000072 push eax 0x00000073 push edx 0x00000074 push edx 0x00000075 je 00007FF008FD8866h 0x0000007b pop edx 0x0000007c rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 96D942 second address: 96D948 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 96D948 second address: 96D9B9 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], eax 0x0000000b push 00000000h 0x0000000d push ebp 0x0000000e call 00007FF008FD8868h 0x00000013 pop ebp 0x00000014 mov dword ptr [esp+04h], ebp 0x00000018 add dword ptr [esp+04h], 0000001Dh 0x00000020 inc ebp 0x00000021 push ebp 0x00000022 ret 0x00000023 pop ebp 0x00000024 ret 0x00000025 clc 0x00000026 push 00000000h 0x00000028 push 00000000h 0x0000002a push ecx 0x0000002b call 00007FF008FD8868h 0x00000030 pop ecx 0x00000031 mov dword ptr [esp+04h], ecx 0x00000035 add dword ptr [esp+04h], 0000001Dh 0x0000003d inc ecx 0x0000003e push ecx 0x0000003f ret 0x00000040 pop ecx 0x00000041 ret 0x00000042 add ebx, dword ptr [ebp+13B93348h] 0x00000048 push 00000000h 0x0000004a and edi, 4E94FDD2h 0x00000050 xchg eax, esi 0x00000051 push eax 0x00000052 push edx 0x00000053 push eax 0x00000054 push edx 0x00000055 jg 00007FF008FD8866h 0x0000005b rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 96D9B9 second address: 96D9CC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF008B8948Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 969CFA second address: 969D04 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FF008FD8866h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 96AB3F second address: 96AB43 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 96AB43 second address: 96ABE9 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FF008FD8866h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b mov dword ptr [esp], eax 0x0000000e xor edi, dword ptr [ebp+13B932D0h] 0x00000014 mov ebx, dword ptr [ebp+13B93460h] 0x0000001a push dword ptr fs:[00000000h] 0x00000021 mov dword ptr fs:[00000000h], esp 0x00000028 jmp 00007FF008FD8870h 0x0000002d add dword ptr [ebp+13D1DBA1h], edx 0x00000033 mov eax, dword ptr [ebp+13B9097Dh] 0x00000039 push 00000000h 0x0000003b push eax 0x0000003c call 00007FF008FD8868h 0x00000041 pop eax 0x00000042 mov dword ptr [esp+04h], eax 0x00000046 add dword ptr [esp+04h], 00000019h 0x0000004e inc eax 0x0000004f push eax 0x00000050 ret 0x00000051 pop eax 0x00000052 ret 0x00000053 mov bx, 4F36h 0x00000057 movzx ebx, di 0x0000005a push FFFFFFFFh 0x0000005c push 00000000h 0x0000005e push edi 0x0000005f call 00007FF008FD8868h 0x00000064 pop edi 0x00000065 mov dword ptr [esp+04h], edi 0x00000069 add dword ptr [esp+04h], 0000001Ch 0x00000071 inc edi 0x00000072 push edi 0x00000073 ret 0x00000074 pop edi 0x00000075 ret 0x00000076 nop 0x00000077 push eax 0x00000078 push edx 0x00000079 push eax 0x0000007a push edx 0x0000007b jmp 00007FF008FD886Fh 0x00000080 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 96ABE9 second address: 96ABED instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 96ABED second address: 96ABF3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 96ABF3 second address: 96AC17 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pushad 0x00000004 popad 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FF008B89499h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9729A7 second address: 9729AC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9729AC second address: 9729B2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9729B2 second address: 972A3E instructions: 0x00000000 rdtsc 0x00000002 js 00007FF008FD8866h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov dword ptr [esp], eax 0x0000000f clc 0x00000010 push 00000000h 0x00000012 add edi, 26C9EE8Bh 0x00000018 push 00000000h 0x0000001a push 00000000h 0x0000001c push ecx 0x0000001d call 00007FF008FD8868h 0x00000022 pop ecx 0x00000023 mov dword ptr [esp+04h], ecx 0x00000027 add dword ptr [esp+04h], 0000001Dh 0x0000002f inc ecx 0x00000030 push ecx 0x00000031 ret 0x00000032 pop ecx 0x00000033 ret 0x00000034 call 00007FF008FD8877h 0x00000039 jmp 00007FF008FD8878h 0x0000003e pop ebx 0x0000003f mov ebx, 14866FA9h 0x00000044 xchg eax, esi 0x00000045 jmp 00007FF008FD8871h 0x0000004a push eax 0x0000004b push ecx 0x0000004c push eax 0x0000004d push edx 0x0000004e pushad 0x0000004f popad 0x00000050 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 96BC63 second address: 96BC69 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 96FCE9 second address: 96FCED instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 972C3F second address: 972C43 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 972C43 second address: 972C51 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c push esi 0x0000000d pop esi 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 972C51 second address: 972C57 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 973AC5 second address: 973AE8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jbe 00007FF008FD8868h 0x0000000c pushad 0x0000000d popad 0x0000000e popad 0x0000000f push eax 0x00000010 push edi 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007FF008FD8870h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 973BCD second address: 973BD2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 974C14 second address: 974C30 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF008FD8878h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 977CBA second address: 977CC6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 91F249 second address: 91F253 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 push edx 0x00000006 pop edx 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 pop esi 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 97C758 second address: 97C75E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 97C75E second address: 97C763 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 97C763 second address: 97C769 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 984297 second address: 98429C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 989034 second address: 989038 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 989038 second address: 989087 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 jmp 00007FF008FD8875h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop ecx 0x0000000c pushad 0x0000000d jo 00007FF008FD8885h 0x00000013 jg 00007FF008FD8866h 0x00000019 jmp 00007FF008FD8879h 0x0000001e push ebx 0x0000001f jl 00007FF008FD8866h 0x00000025 push edx 0x00000026 pop edx 0x00000027 pop ebx 0x00000028 push esi 0x00000029 push eax 0x0000002a push edx 0x0000002b rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 988764 second address: 98876A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 988A16 second address: 988A1A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 988A1A second address: 988A40 instructions: 0x00000000 rdtsc 0x00000002 ja 00007FF008B89486h 0x00000008 jns 00007FF008B89486h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 jmp 00007FF008B89496h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 988E87 second address: 988E9E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF008FD8872h 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 988E9E second address: 988EB9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FF008B8948Ah 0x00000008 pushad 0x00000009 popad 0x0000000a push ebx 0x0000000b pop ebx 0x0000000c jc 00007FF008B89486h 0x00000012 popad 0x00000013 pushad 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 98F3E7 second address: 98F3EB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 98F3EB second address: 98F3EF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 98F3EF second address: 98F401 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jne 00007FF008FD886Ch 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 98F401 second address: 98F40B instructions: 0x00000000 rdtsc 0x00000002 je 00007FF008B8948Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 911B18 second address: 911B1E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 98E1C3 second address: 98E1C9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 98E1C9 second address: 98E1CF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 98E1CF second address: 98E1D9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push eax 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 98E1D9 second address: 98E201 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF008FD8877h 0x00000009 push esi 0x0000000a pop esi 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e jp 00007FF008FD8866h 0x00000014 push ecx 0x00000015 pop ecx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 98E201 second address: 98E218 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007FF008B8948Eh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 98E3AA second address: 98E3B7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 jns 00007FF008FD8866h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 962823 second address: 962827 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 98F0D4 second address: 98F0D8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 98F0D8 second address: 98F0E2 instructions: 0x00000000 rdtsc 0x00000002 jc 00007FF008B89486h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9228B4 second address: 9228BF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007FF008FD8866h 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 91BBD2 second address: 91BBD9 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push edx 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 91BBD9 second address: 91BBF1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007FF008FD8871h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 91BBF1 second address: 91BC11 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FF008B89494h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 91BC11 second address: 91BC19 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 91BC19 second address: 91BC2A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jng 00007FF008B89486h 0x00000009 jbe 00007FF008B89486h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 999BE8 second address: 999BF3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 999BF3 second address: 999BF9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 999BF9 second address: 999BFD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 999BFD second address: 999C18 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF008B89491h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e pop eax 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 999C18 second address: 999C32 instructions: 0x00000000 rdtsc 0x00000002 jc 00007FF008FD8866h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b push ebx 0x0000000c push eax 0x0000000d push edx 0x0000000e jnl 00007FF008FD8866h 0x00000014 jne 00007FF008FD8866h 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 999C32 second address: 999C40 instructions: 0x00000000 rdtsc 0x00000002 jns 00007FF008B89486h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 999C40 second address: 999C44 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 999F16 second address: 999F1F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop edi 0x00000005 pushad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 99A1E3 second address: 99A1FE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop edi 0x00000005 jmp 00007FF008FD8872h 0x0000000a pushad 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 99A5E5 second address: 99A640 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007FF008B89486h 0x0000000a jmp 00007FF008B8948Ch 0x0000000f pushad 0x00000010 popad 0x00000011 popad 0x00000012 pushad 0x00000013 jmp 00007FF008B89498h 0x00000018 jmp 00007FF008B89499h 0x0000001d push edi 0x0000001e pop edi 0x0000001f popad 0x00000020 jc 00007FF008B89488h 0x00000026 pushad 0x00000027 popad 0x00000028 push edi 0x00000029 pushad 0x0000002a popad 0x0000002b push eax 0x0000002c push edx 0x0000002d rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 99A640 second address: 99A654 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 jnp 00007FF008FD8868h 0x0000000e push ebx 0x0000000f pop ebx 0x00000010 push ecx 0x00000011 push ebx 0x00000012 pop ebx 0x00000013 pop ecx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 99A797 second address: 99A79F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 99A79F second address: 99A7F1 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 jmp 00007FF008FD8879h 0x00000008 push eax 0x00000009 pop eax 0x0000000a pop ecx 0x0000000b jmp 00007FF008FD886Bh 0x00000010 pop edx 0x00000011 pop eax 0x00000012 push eax 0x00000013 push edx 0x00000014 ja 00007FF008FD8884h 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 94663B second address: 946683 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push edx 0x00000009 jmp 00007FF008B89497h 0x0000000e push esi 0x0000000f pop esi 0x00000010 pop edx 0x00000011 pushad 0x00000012 pushad 0x00000013 pushad 0x00000014 popad 0x00000015 jmp 00007FF008B89492h 0x0000001a push edi 0x0000001b pop edi 0x0000001c popad 0x0000001d jg 00007FF008B89488h 0x00000023 pushad 0x00000024 popad 0x00000025 push eax 0x00000026 push edx 0x00000027 pushad 0x00000028 popad 0x00000029 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 946683 second address: 946690 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 pop eax 0x00000009 pushad 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 99ACE0 second address: 99ACE4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 99ACE4 second address: 99ACE8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 99ACE8 second address: 99ACEE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 99ACEE second address: 99ACF4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 99ACF4 second address: 99AD3B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF008B8948Ah 0x00000007 jmp 00007FF008B89496h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e jnp 00007FF008B894BDh 0x00000014 push eax 0x00000015 push edx 0x00000016 push esi 0x00000017 pop esi 0x00000018 jmp 00007FF008B89499h 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 99AD3B second address: 99AD4F instructions: 0x00000000 rdtsc 0x00000002 jno 00007FF008FD8866h 0x00000008 push edx 0x00000009 pop edx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c ja 00007FF008FD886Eh 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 95BF1E second address: 95BF28 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pushad 0x00000006 pushad 0x00000007 popad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 95C53E second address: 95C542 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 95C542 second address: 95C577 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 jne 00007FF008B8948Eh 0x0000000e mov eax, dword ptr [esp+04h] 0x00000012 jmp 00007FF008B8948Bh 0x00000017 mov eax, dword ptr [eax] 0x00000019 push eax 0x0000001a push edx 0x0000001b jmp 00007FF008B8948Ch 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 95C577 second address: 95C57C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 95C65C second address: 95C662 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 95C703 second address: 95C70D instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 95C70D second address: 95C711 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 95C711 second address: 95C715 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 95C7FA second address: 95C800 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 95C800 second address: 95C804 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 95C804 second address: 95C82A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jmp 00007FF008B89494h 0x0000000e mov eax, dword ptr [esp+04h] 0x00000012 push esi 0x00000013 push eax 0x00000014 push edx 0x00000015 pushad 0x00000016 popad 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 95CA80 second address: 95CA85 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 95CE03 second address: 95CE09 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 95CE09 second address: 95CE0D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 95CE0D second address: 95CE1F instructions: 0x00000000 rdtsc 0x00000002 jnl 00007FF008B89486h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f push edi 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 95CE1F second address: 95CE24 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 95CE24 second address: 95CE64 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push esi 0x00000004 pop esi 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 nop 0x00000009 push 00000000h 0x0000000b push ebx 0x0000000c call 00007FF008B89488h 0x00000011 pop ebx 0x00000012 mov dword ptr [esp+04h], ebx 0x00000016 add dword ptr [esp+04h], 0000001Bh 0x0000001e inc ebx 0x0000001f push ebx 0x00000020 ret 0x00000021 pop ebx 0x00000022 ret 0x00000023 mov dx, di 0x00000026 push 0000001Eh 0x00000028 mov cl, 84h 0x0000002a mov edi, dword ptr [ebp+13B934C4h] 0x00000030 push eax 0x00000031 push eax 0x00000032 push edx 0x00000033 push ecx 0x00000034 push eax 0x00000035 pop eax 0x00000036 pop ecx 0x00000037 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 95CFFA second address: 95CFFE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 95CFFE second address: 95D004 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 95D221 second address: 94663B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF008FD886Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], eax 0x0000000c mov edx, edi 0x0000000e lea eax, dword ptr [ebp+13D40D1Eh] 0x00000014 jnp 00007FF008FD8869h 0x0000001a nop 0x0000001b jmp 00007FF008FD8872h 0x00000020 push eax 0x00000021 jno 00007FF008FD8874h 0x00000027 nop 0x00000028 jp 00007FF008FD8872h 0x0000002e jg 00007FF008FD886Ch 0x00000034 jnc 00007FF008FD886Ch 0x0000003a call dword ptr [ebp+13B9315Ch] 0x00000040 js 00007FF008FD8891h 0x00000046 push eax 0x00000047 push edx 0x00000048 jno 00007FF008FD8866h 0x0000004e rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 99EB66 second address: 99EB8D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push edi 0x00000007 jnp 00007FF008B89486h 0x0000000d jmp 00007FF008B89495h 0x00000012 pop edi 0x00000013 push eax 0x00000014 push edx 0x00000015 pushad 0x00000016 popad 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 99ECE0 second address: 99ECE4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 99ECE4 second address: 99ED0B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 jbe 00007FF008B89486h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FF008B89493h 0x00000013 jo 00007FF008B89486h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 99EE70 second address: 99EE75 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 99EE75 second address: 99EE7D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 99EE7D second address: 99EEB2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF008FD8878h 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007FF008FD8873h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 99EEB2 second address: 99EEDD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF008B8948Fh 0x00000007 jne 00007FF008B89486h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007FF008B8948Eh 0x00000016 push edi 0x00000017 pop edi 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 99EEDD second address: 99EF01 instructions: 0x00000000 rdtsc 0x00000002 jne 00007FF008FD8866h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push edi 0x0000000c pop edi 0x0000000d jmp 00007FF008FD8871h 0x00000012 push edi 0x00000013 pop edi 0x00000014 popad 0x00000015 push ebx 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9A6884 second address: 9A688B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop ebx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9A69E1 second address: 9A69F5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF008FD886Eh 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9A90FA second address: 9A9104 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push edi 0x00000007 pop edi 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9AD88D second address: 9AD8A0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF008FD886Dh 0x00000009 push eax 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9AD8A0 second address: 9AD8B4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push edx 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop edx 0x00000009 pop eax 0x0000000a je 00007FF008B894A0h 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9AD8B4 second address: 9AD8BA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9AD8BA second address: 9AD8BE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9B0C6C second address: 9B0C82 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF008FD8872h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9B0C82 second address: 9B0CA0 instructions: 0x00000000 rdtsc 0x00000002 jc 00007FF008B89486h 0x00000008 jnc 00007FF008B89486h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 push edx 0x00000012 js 00007FF008B89486h 0x00000018 je 00007FF008B89486h 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9B0661 second address: 9B0690 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pushad 0x00000008 push esi 0x00000009 pop esi 0x0000000a jmp 00007FF008FD8876h 0x0000000f jmp 00007FF008FD886Ah 0x00000014 popad 0x00000015 push eax 0x00000016 push edx 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9B0690 second address: 9B0696 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9B0978 second address: 9B097C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9B097C second address: 9B099A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FF008B89492h 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e pop eax 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9B4F6F second address: 9B4F73 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9B4F73 second address: 9B4F88 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push esi 0x00000007 pushad 0x00000008 popad 0x00000009 pop esi 0x0000000a pushad 0x0000000b jg 00007FF008B89486h 0x00000011 push edi 0x00000012 pop edi 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9B4F88 second address: 9B4F93 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9B50EB second address: 9B50F5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007FF008B89486h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9B526F second address: 9B5274 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9B552D second address: 9B5547 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF008B8948Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push esi 0x0000000a push eax 0x0000000b push edx 0x0000000c push edx 0x0000000d pop edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9B5547 second address: 9B554B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 95CD2D second address: 95CD35 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push edx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9B585C second address: 9B5860 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9B5860 second address: 9B5864 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9B6493 second address: 9B6497 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9BBF8F second address: 9BBFB2 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 je 00007FF008B89486h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jmp 00007FF008B89493h 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9BBFB2 second address: 9BBFB6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9BC0EA second address: 9BC109 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jg 00007FF008B89486h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push ecx 0x0000000d pushad 0x0000000e popad 0x0000000f jmp 00007FF008B8948Bh 0x00000014 pop ecx 0x00000015 push eax 0x00000016 push edx 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9BC109 second address: 9BC10F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9BC10F second address: 9BC113 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9BC113 second address: 9BC117 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9BC3F0 second address: 9BC43C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007FF008B89490h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jne 00007FF008B8949Bh 0x00000011 jp 00007FF008B89486h 0x00000017 jmp 00007FF008B8948Fh 0x0000001c push eax 0x0000001d push edx 0x0000001e jmp 00007FF008B89499h 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9BD59B second address: 9BD5A1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9C3426 second address: 9C342A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9C7278 second address: 9C727C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9C63AB second address: 9C63AF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9C63AF second address: 9C63D6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jmp 00007FF008FD8872h 0x0000000e jmp 00007FF008FD886Bh 0x00000013 pop eax 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9C63D6 second address: 9C63E1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 jg 00007FF008B89486h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9C6529 second address: 9C652D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9C652D second address: 9C654A instructions: 0x00000000 rdtsc 0x00000002 jp 00007FF008B89486h 0x00000008 jmp 00007FF008B8948Fh 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9C654A second address: 9C654E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9C654E second address: 9C6552 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9C6552 second address: 9C6558 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9C6558 second address: 9C655F instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9C655F second address: 9C656C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push eax 0x00000006 push edx 0x00000007 jnl 00007FF008FD8866h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9C68C3 second address: 9C68C7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9C68C7 second address: 9C68CD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9C6E44 second address: 9C6E4A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9C6E4A second address: 9C6E55 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9C6E55 second address: 9C6E5C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9CD4F1 second address: 9CD559 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF008FD8879h 0x00000009 pop edi 0x0000000a jmp 00007FF008FD8877h 0x0000000f pushad 0x00000010 jbe 00007FF008FD8866h 0x00000016 pushad 0x00000017 popad 0x00000018 push edx 0x00000019 pop edx 0x0000001a popad 0x0000001b jnc 00007FF008FD8882h 0x00000021 popad 0x00000022 pushad 0x00000023 pushad 0x00000024 push eax 0x00000025 push edx 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9CD559 second address: 9CD584 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 jmp 00007FF008B89492h 0x0000000b popad 0x0000000c pushad 0x0000000d push eax 0x0000000e pop eax 0x0000000f jnp 00007FF008B89486h 0x00000015 popad 0x00000016 push eax 0x00000017 push edx 0x00000018 jc 00007FF008B89486h 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9CD6E5 second address: 9CD6EB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9CD9CD second address: 9CD9DA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 js 00007FF008B89486h 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9CDDA0 second address: 9CDDA6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9CDDA6 second address: 9CDDAC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9CDDAC second address: 9CDDC2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF008FD8872h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9CDDC2 second address: 9CDDCD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9CE672 second address: 9CE678 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9CE678 second address: 9CE696 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007FF008B89499h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9CE696 second address: 9CE6C5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF008FD8875h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 ja 00007FF008FD8884h 0x0000000f pushad 0x00000010 pushad 0x00000011 popad 0x00000012 jo 00007FF008FD8866h 0x00000018 push eax 0x00000019 pop eax 0x0000001a popad 0x0000001b push eax 0x0000001c push edx 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9CE6C5 second address: 9CE6C9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9CE6C9 second address: 9CE6CD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9CCCC6 second address: 9CCCCC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9CCCCC second address: 9CCCD5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9CCCD5 second address: 9CCCDB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9D79AB second address: 9D79B0 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9D79B0 second address: 9D79D8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF008B8948Dh 0x00000009 pop ebx 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FF008B89494h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9D79D8 second address: 9D79DC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9D73E9 second address: 9D7403 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FF008B89491h 0x00000008 jmp 00007FF008B8948Bh 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9D7403 second address: 9D740D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jbe 00007FF008FD8866h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9D740D second address: 9D7411 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9D76B2 second address: 9D76B8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9D76B8 second address: 9D76C3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9E1C19 second address: 9E1C1F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9E1C1F second address: 9E1C2C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 jnc 00007FF008B8948Ch 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9E1C2C second address: 9E1C30 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9E1C30 second address: 9E1C35 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 925D80 second address: 925D86 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9EA615 second address: 9EA61B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9EA61B second address: 9EA625 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007FF008FD8866h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9EEE91 second address: 9EEE99 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9EEE99 second address: 9EEEB4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF008FD886Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jno 00007FF008FD8866h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9EEEB4 second address: 9EEEB8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: A01258 second address: A0125C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9FFEFD second address: 9FFF05 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9FFF05 second address: 9FFF09 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9FFF09 second address: 9FFF2E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF008B8948Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a jl 00007FF008B89486h 0x00000010 js 00007FF008B89486h 0x00000016 popad 0x00000017 pop edx 0x00000018 pop eax 0x00000019 pushad 0x0000001a push edx 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 9FFF2E second address: 9FFF41 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push edx 0x00000006 jne 00007FF008FD8866h 0x0000000c pushad 0x0000000d popad 0x0000000e pop edx 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 popad 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: A0009F second address: A000AC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 push ecx 0x00000007 pop ecx 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: A000AC second address: A000C3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF008FD8873h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: A005DC second address: A00611 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF008B89494h 0x00000007 jno 00007FF008B89486h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pop edi 0x00000010 pushad 0x00000011 push eax 0x00000012 pushad 0x00000013 popad 0x00000014 pop eax 0x00000015 jmp 00007FF008B8948Eh 0x0000001a push eax 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: A00F7F second address: A00F85 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: A00F85 second address: A00F8F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: A03A5F second address: A03A69 instructions: 0x00000000 rdtsc 0x00000002 jc 00007FF008FD886Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: A0ACD3 second address: A0ACDA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop ecx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: A0ACDA second address: A0AD08 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push edi 0x00000004 pop edi 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push esi 0x0000000a pushad 0x0000000b popad 0x0000000c jmp 00007FF008FD886Dh 0x00000011 pop esi 0x00000012 pushad 0x00000013 jmp 00007FF008FD8871h 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: A0C479 second address: A0C483 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FF008B89486h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: A0C483 second address: A0C4A5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 jmp 00007FF008FD8877h 0x0000000c pop eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: A0C324 second address: A0C32E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007FF008B89486h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: A11EC0 second address: A11EC9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: A11EC9 second address: A11ED8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF008B8948Bh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: A11ED8 second address: A11EDC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: A11EDC second address: A11EE2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: A149DF second address: A149E5 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: A215C5 second address: A21601 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jmp 00007FF008B89495h 0x0000000d push eax 0x0000000e push edx 0x0000000f jc 00007FF008B89486h 0x00000015 jmp 00007FF008B89497h 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: A2324D second address: A23257 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FF008FD8866h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: A23257 second address: A2326B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jbe 00007FF008B89486h 0x0000000a jmp 00007FF008B8948Ah 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: A2326B second address: A2327C instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 jg 00007FF008FD8866h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d push edx 0x0000000e pop edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: A2B5B9 second address: A2B5BF instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: A2FA97 second address: A2FA9B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: A2FDD6 second address: A2FE08 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF008B8948Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b pushad 0x0000000c jmp 00007FF008B89498h 0x00000011 push edx 0x00000012 pop edx 0x00000013 popad 0x00000014 push esi 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: A300EC second address: A300F0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: A315BB second address: A315D8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF008B89493h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A10D51 second address: 4A10D63 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF008FD886Eh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A10CAC second address: 4A10CB2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A20185 second address: 4A201E8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FF008FD886Fh 0x00000009 adc si, 6E9Eh 0x0000000e jmp 00007FF008FD8879h 0x00000013 popfd 0x00000014 popad 0x00000015 pop edx 0x00000016 pop eax 0x00000017 push ebx 0x00000018 push eax 0x00000019 push edx 0x0000001a pushad 0x0000001b call 00007FF008FD886Fh 0x00000020 pop ecx 0x00000021 jmp 00007FF008FD8879h 0x00000026 popad 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A201E8 second address: 4A20274 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FF008B89497h 0x00000009 or ch, FFFFFFBEh 0x0000000c jmp 00007FF008B89499h 0x00000011 popfd 0x00000012 jmp 00007FF008B89490h 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a mov dword ptr [esp], ebp 0x0000001d pushad 0x0000001e mov al, F5h 0x00000020 pushfd 0x00000021 jmp 00007FF008B89493h 0x00000026 add ax, 097Eh 0x0000002b jmp 00007FF008B89499h 0x00000030 popfd 0x00000031 popad 0x00000032 mov ebp, esp 0x00000034 pushad 0x00000035 push eax 0x00000036 push edx 0x00000037 mov ch, 9Eh 0x00000039 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A20274 second address: 4A2029B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF008FD886Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a pop ebp 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FF008FD8870h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A10EF6 second address: 4A10F2A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF008B89491h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jmp 00007FF008B89491h 0x0000000f xchg eax, ebp 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 mov cx, bx 0x00000016 mov edx, 0C0B076Ah 0x0000001b popad 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A10F2A second address: 4A10F6E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007FF008FD886Eh 0x00000008 pop esi 0x00000009 movsx edx, si 0x0000000c popad 0x0000000d pop edx 0x0000000e pop eax 0x0000000f mov ebp, esp 0x00000011 pushad 0x00000012 mov edx, eax 0x00000014 push eax 0x00000015 push edx 0x00000016 pushfd 0x00000017 jmp 00007FF008FD8872h 0x0000001c and ecx, 7AEB2E88h 0x00000022 jmp 00007FF008FD886Bh 0x00000027 popfd 0x00000028 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A10F6E second address: 4A10F8B instructions: 0x00000000 rdtsc 0x00000002 mov cx, 96FFh 0x00000006 pop edx 0x00000007 pop eax 0x00000008 popad 0x00000009 pop ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FF008B89491h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A10F8B second address: 4A10F9B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF008FD886Ch 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A31859 second address: 4A3185F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A3185F second address: 4A31863 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A31992 second address: 4A319A8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF008B89492h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A319A8 second address: 4A31A01 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF008FD886Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b je 00007FF07A1AB832h 0x00000011 jmp 00007FF008FD8876h 0x00000016 cmp dword ptr [ebp+08h], 00002000h 0x0000001d pushad 0x0000001e pushad 0x0000001f movzx eax, bx 0x00000022 jmp 00007FF008FD8879h 0x00000027 popad 0x00000028 push eax 0x00000029 push edx 0x0000002a mov cx, E97Dh 0x0000002e rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A10C44 second address: 4A10C4A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A202D2 second address: 4A20324 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF008FD8871h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jmp 00007FF008FD8871h 0x0000000f xchg eax, ebp 0x00000010 jmp 00007FF008FD886Eh 0x00000015 mov ebp, esp 0x00000017 pushad 0x00000018 mov edi, eax 0x0000001a mov ebx, esi 0x0000001c popad 0x0000001d xchg eax, esi 0x0000001e pushad 0x0000001f mov ch, BDh 0x00000021 push eax 0x00000022 push edx 0x00000023 call 00007FF008FD886Dh 0x00000028 pop esi 0x00000029 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A20324 second address: 4A20344 instructions: 0x00000000 rdtsc 0x00000002 mov esi, ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FF008B89494h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A20344 second address: 4A20353 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF008FD886Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A20353 second address: 4A2036D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 xchg eax, esi 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FF008B8948Fh 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A2036D second address: 4A20371 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A20371 second address: 4A20377 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A20377 second address: 4A2037D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A2037D second address: 4A20381 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A20381 second address: 4A20385 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A20385 second address: 4A20437 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov esi, dword ptr [ebp+0Ch] 0x0000000b jmp 00007FF008B8948Ah 0x00000010 test esi, esi 0x00000012 jmp 00007FF008B89490h 0x00000017 je 00007FF079D77491h 0x0000001d jmp 00007FF008B89490h 0x00000022 cmp dword ptr [75C7459Ch], 05h 0x00000029 pushad 0x0000002a mov edi, esi 0x0000002c pushad 0x0000002d pushfd 0x0000002e jmp 00007FF008B89498h 0x00000033 sbb cx, 7368h 0x00000038 jmp 00007FF008B8948Bh 0x0000003d popfd 0x0000003e mov ebx, esi 0x00000040 popad 0x00000041 popad 0x00000042 je 00007FF079D8F522h 0x00000048 jmp 00007FF008B89492h 0x0000004d xchg eax, esi 0x0000004e pushad 0x0000004f mov ax, dx 0x00000052 popad 0x00000053 push eax 0x00000054 jmp 00007FF008B89496h 0x00000059 xchg eax, esi 0x0000005a push eax 0x0000005b push edx 0x0000005c push eax 0x0000005d push edx 0x0000005e pushad 0x0000005f popad 0x00000060 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A20437 second address: 4A2043B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A2043B second address: 4A20441 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A20469 second address: 4A2046D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A2046D second address: 4A20473 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A20473 second address: 4A204BF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF008FD886Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, esi 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d pushad 0x0000000e popad 0x0000000f pushfd 0x00000010 jmp 00007FF008FD8873h 0x00000015 or si, 242Eh 0x0000001a jmp 00007FF008FD8879h 0x0000001f popfd 0x00000020 popad 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A204BF second address: 4A20502 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov edi, 7C404342h 0x00000008 pushfd 0x00000009 jmp 00007FF008B89493h 0x0000000e jmp 00007FF008B89493h 0x00000013 popfd 0x00000014 popad 0x00000015 pop edx 0x00000016 pop eax 0x00000017 push eax 0x00000018 push eax 0x00000019 push edx 0x0000001a push eax 0x0000001b push edx 0x0000001c jmp 00007FF008B8948Bh 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A20502 second address: 4A2051F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF008FD8879h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A2051F second address: 4A20524 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A2054F second address: 4A20555 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A20555 second address: 4A20559 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 96064D second address: 960651 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A40038 second address: 4A40071 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF008B89491h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jmp 00007FF008B89491h 0x0000000f mov eax, dword ptr [esp+04h] 0x00000013 push eax 0x00000014 push edx 0x00000015 jmp 00007FF008B8948Ch 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A40071 second address: 4A40096 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF008FD886Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [eax] 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e mov edi, eax 0x00000010 jmp 00007FF008FD886Eh 0x00000015 popad 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A40096 second address: 4A400DE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF008B8948Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp+04h], eax 0x0000000d jmp 00007FF008B89499h 0x00000012 pop eax 0x00000013 push eax 0x00000014 push edx 0x00000015 pushad 0x00000016 call 00007FF008B89493h 0x0000001b pop ecx 0x0000001c mov ax, bx 0x0000001f popad 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A400DE second address: 4A400E4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A400E4 second address: 4A400E8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A400E8 second address: 4A40105 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF008FD886Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push 3535CFB5h 0x00000010 pushad 0x00000011 movsx edx, ax 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A40105 second address: 4A40186 instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007FF008B89492h 0x00000008 sub esi, 6EEDF8F8h 0x0000000e jmp 00007FF008B8948Bh 0x00000013 popfd 0x00000014 pop edx 0x00000015 pop eax 0x00000016 popad 0x00000017 add dword ptr [esp], 4077307Bh 0x0000001e pushad 0x0000001f pushfd 0x00000020 jmp 00007FF008B89494h 0x00000025 adc ecx, 46195358h 0x0000002b jmp 00007FF008B8948Bh 0x00000030 popfd 0x00000031 push eax 0x00000032 push edx 0x00000033 pushfd 0x00000034 jmp 00007FF008B89496h 0x00000039 xor ch, FFFFFFB8h 0x0000003c jmp 00007FF008B8948Bh 0x00000041 popfd 0x00000042 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A40258 second address: 4A402BA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF008FD8879h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 and dword ptr [ebp-04h], 00000000h 0x0000000d jmp 00007FF008FD886Eh 0x00000012 test ebx, ebx 0x00000014 pushad 0x00000015 push eax 0x00000016 call 00007FF008FD886Dh 0x0000001b pop ecx 0x0000001c pop ebx 0x0000001d mov bx, si 0x00000020 popad 0x00000021 je 00007FF07A03B683h 0x00000027 push eax 0x00000028 push edx 0x00000029 push eax 0x0000002a push edx 0x0000002b jmp 00007FF008FD8872h 0x00000030 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A402BA second address: 4A402C9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF008B8948Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A402C9 second address: 4A40335 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FF008FD886Fh 0x00000009 sbb ax, D72Eh 0x0000000e jmp 00007FF008FD8879h 0x00000013 popfd 0x00000014 pushad 0x00000015 popad 0x00000016 popad 0x00000017 pop edx 0x00000018 pop eax 0x00000019 lea eax, dword ptr [ebp-00000110h] 0x0000001f jmp 00007FF008FD886Ch 0x00000024 nop 0x00000025 push eax 0x00000026 push edx 0x00000027 pushad 0x00000028 mov di, 08C0h 0x0000002c call 00007FF008FD8879h 0x00000031 pop eax 0x00000032 popad 0x00000033 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A40335 second address: 4A4033B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A4033B second address: 4A4033F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A4033F second address: 4A40381 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF008B89498h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c jmp 00007FF008B8948Bh 0x00000011 nop 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007FF008B89495h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A40381 second address: 4A40387 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A404C8 second address: 4A404CC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A404CC second address: 4A404E9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF008FD8879h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A404E9 second address: 4A40514 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov edi, 36509C72h 0x00000008 movsx ebx, cx 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f jmp 00007FF008B89495h 0x00000014 nop 0x00000015 push eax 0x00000016 push edx 0x00000017 push eax 0x00000018 push edx 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A40514 second address: 4A40518 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A40518 second address: 4A4051E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A4051E second address: 4A40552 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF008FD8872h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 lea ecx, dword ptr [ebx+04h] 0x0000000c pushad 0x0000000d mov cl, F7h 0x0000000f mov ax, dx 0x00000012 popad 0x00000013 push 00000027h 0x00000015 push eax 0x00000016 push edx 0x00000017 jmp 00007FF008FD8870h 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A40596 second address: 4A4059C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A4059C second address: 4A405B5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF008FD886Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov esi, eax 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 popad 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A405B5 second address: 4A405D0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF008B89497h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A30028 second address: 4A30065 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007FF008FD8871h 0x00000008 pop ecx 0x00000009 mov edx, 510A4924h 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 xchg eax, ebp 0x00000012 jmp 00007FF008FD8873h 0x00000017 mov ebp, esp 0x00000019 push eax 0x0000001a push edx 0x0000001b pushad 0x0000001c movsx ebx, ax 0x0000001f mov dx, si 0x00000022 popad 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A30065 second address: 4A30098 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov dl, 26h 0x00000005 call 00007FF008B89490h 0x0000000a pop eax 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e and esp, FFFFFFF8h 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 jmp 00007FF008B89493h 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A30098 second address: 4A300B5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF008FD8879h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A300B5 second address: 4A30117 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov cx, bx 0x00000006 movsx edx, ax 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c sub esp, 00000364h 0x00000012 jmp 00007FF008B89492h 0x00000017 mov eax, dword ptr [75C74538h] 0x0000001c jmp 00007FF008B89490h 0x00000021 xor eax, esp 0x00000023 jmp 00007FF008B89491h 0x00000028 mov dword ptr [esp+00000360h], eax 0x0000002f push eax 0x00000030 push edx 0x00000031 jmp 00007FF008B8948Dh 0x00000036 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A30117 second address: 4A3012F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ch, bh 0x00000005 pushad 0x00000006 popad 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a xchg eax, ebx 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FF008FD886Bh 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A3012F second address: 4A30135 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A30135 second address: 4A30156 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF008FD886Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007FF008FD886Bh 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A30156 second address: 4A3015A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A3015A second address: 4A30160 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A30160 second address: 4A3016A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov eax, 7B095351h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A3016A second address: 4A30189 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 xchg eax, ebx 0x00000008 pushad 0x00000009 mov edx, esi 0x0000000b mov ecx, 1E9373CBh 0x00000010 popad 0x00000011 mov ebx, dword ptr [ebp+08h] 0x00000014 push eax 0x00000015 push edx 0x00000016 pushad 0x00000017 mov edi, 413B103Eh 0x0000001c mov esi, ebx 0x0000001e popad 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A30189 second address: 4A30259 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF008B89490h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, esi 0x0000000a pushad 0x0000000b mov edi, esi 0x0000000d call 00007FF008B8948Ah 0x00000012 mov edi, ecx 0x00000014 pop esi 0x00000015 popad 0x00000016 push eax 0x00000017 pushad 0x00000018 mov edi, eax 0x0000001a push ecx 0x0000001b call 00007FF008B89495h 0x00000020 pop eax 0x00000021 pop edx 0x00000022 popad 0x00000023 xchg eax, esi 0x00000024 jmp 00007FF008B8948Ch 0x00000029 mov esi, dword ptr [ebp+10h] 0x0000002c pushad 0x0000002d pushad 0x0000002e call 00007FF008B89493h 0x00000033 pop esi 0x00000034 popad 0x00000035 pushfd 0x00000036 jmp 00007FF008B89499h 0x0000003b or ecx, 66570E96h 0x00000041 jmp 00007FF008B89491h 0x00000046 popfd 0x00000047 popad 0x00000048 xchg eax, edi 0x00000049 jmp 00007FF008B8948Eh 0x0000004e push eax 0x0000004f jmp 00007FF008B8948Bh 0x00000054 xchg eax, edi 0x00000055 push eax 0x00000056 push edx 0x00000057 jmp 00007FF008B89495h 0x0000005c rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A30259 second address: 4A302E5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF008FD8871h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 sub edi, edi 0x0000000b jmp 00007FF008FD8877h 0x00000010 mov eax, dword ptr [esi] 0x00000012 pushad 0x00000013 mov ebx, eax 0x00000015 pushfd 0x00000016 jmp 00007FF008FD8870h 0x0000001b add esi, 0AF08DD8h 0x00000021 jmp 00007FF008FD886Bh 0x00000026 popfd 0x00000027 popad 0x00000028 lea ecx, dword ptr [esi+04h] 0x0000002b push eax 0x0000002c push edx 0x0000002d pushad 0x0000002e pushfd 0x0000002f jmp 00007FF008FD886Bh 0x00000034 or ax, F09Eh 0x00000039 jmp 00007FF008FD8879h 0x0000003e popfd 0x0000003f mov bx, cx 0x00000042 popad 0x00000043 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A302E5 second address: 4A302EB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A302EB second address: 4A30338 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF008FD886Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b cmp eax, 04h 0x0000000e jmp 00007FF008FD8876h 0x00000013 jbe 00007FF008FD8ABEh 0x00000019 push eax 0x0000001a push edx 0x0000001b jmp 00007FF008FD8877h 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A30338 second address: 4A3035E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF008B89499h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 add eax, FFFFFFFCh 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A3035E second address: 4A30362 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A30362 second address: 4A30368 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A30368 second address: 4A3037A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov bx, cx 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b nop 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A3037A second address: 4A3037E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A3037E second address: 4A30384 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A30384 second address: 4A3038A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A3038A second address: 4A303B9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF008FD8876h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c jmp 00007FF008FD886Bh 0x00000011 nop 0x00000012 pushad 0x00000013 push eax 0x00000014 push edx 0x00000015 movzx ecx, dx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A303B9 second address: 4A30434 instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007FF008B89497h 0x00000008 sub ch, 0000003Eh 0x0000000b jmp 00007FF008B89499h 0x00000010 popfd 0x00000011 pop edx 0x00000012 pop eax 0x00000013 pushfd 0x00000014 jmp 00007FF008B89490h 0x00000019 and cl, 00000038h 0x0000001c jmp 00007FF008B8948Bh 0x00000021 popfd 0x00000022 popad 0x00000023 xchg eax, edi 0x00000024 jmp 00007FF008B89496h 0x00000029 push eax 0x0000002a push eax 0x0000002b push edx 0x0000002c pushad 0x0000002d push ecx 0x0000002e pop edx 0x0000002f movzx eax, di 0x00000032 popad 0x00000033 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A30434 second address: 4A3043A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A3043A second address: 4A304DD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, edi 0x00000009 pushad 0x0000000a pushfd 0x0000000b jmp 00007FF008B89496h 0x00000010 jmp 00007FF008B89495h 0x00000015 popfd 0x00000016 pushad 0x00000017 mov di, ax 0x0000001a mov dx, si 0x0000001d popad 0x0000001e popad 0x0000001f xchg eax, ecx 0x00000020 pushad 0x00000021 call 00007FF008B89492h 0x00000026 mov si, 7291h 0x0000002a pop ecx 0x0000002b mov al, dl 0x0000002d popad 0x0000002e push eax 0x0000002f pushad 0x00000030 jmp 00007FF008B8948Fh 0x00000035 pushad 0x00000036 movzx eax, di 0x00000039 mov bx, D756h 0x0000003d popad 0x0000003e popad 0x0000003f xchg eax, ecx 0x00000040 push eax 0x00000041 push edx 0x00000042 pushad 0x00000043 mov bx, ax 0x00000046 pushfd 0x00000047 jmp 00007FF008B89492h 0x0000004c sub si, 1978h 0x00000051 jmp 00007FF008B8948Bh 0x00000056 popfd 0x00000057 popad 0x00000058 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A304DD second address: 4A304F5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF008FD8874h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A304F5 second address: 4A304F9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A30537 second address: 4A3053D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A3053D second address: 4A30541 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A30541 second address: 4A305AD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF008FD8877h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b add esp, 0Ch 0x0000000e jmp 00007FF008FD8876h 0x00000013 mov dword ptr [esp+20h], 00000348h 0x0000001b jmp 00007FF008FD8870h 0x00000020 test ebx, ebx 0x00000022 jmp 00007FF008FD8870h 0x00000027 jne 00007FF07A1C76CBh 0x0000002d push eax 0x0000002e push edx 0x0000002f push eax 0x00000030 push edx 0x00000031 push eax 0x00000032 push edx 0x00000033 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A305AD second address: 4A305B1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A305B1 second address: 4A305B5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A305B5 second address: 4A305BB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A305BB second address: 4A305FB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF008FD8874h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push dword ptr [ebp+14h] 0x0000000c pushad 0x0000000d pushfd 0x0000000e jmp 00007FF008FD886Eh 0x00000013 and si, CEE8h 0x00000018 jmp 00007FF008FD886Bh 0x0000001d popfd 0x0000001e push eax 0x0000001f push edx 0x00000020 pushad 0x00000021 popad 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A305FB second address: 4A3061E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF008B89494h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a lea eax, dword ptr [esp+24h] 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A3061E second address: 4A30622 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A30622 second address: 4A30626 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A30626 second address: 4A3062C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A3062C second address: 4A30632 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A30632 second address: 4A30636 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A30636 second address: 4A30677 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 nop 0x00000009 pushad 0x0000000a mov bx, ax 0x0000000d push ecx 0x0000000e pushfd 0x0000000f jmp 00007FF008B8948Bh 0x00000014 or eax, 5FC6BC3Eh 0x0000001a jmp 00007FF008B89499h 0x0000001f popfd 0x00000020 pop ecx 0x00000021 popad 0x00000022 push eax 0x00000023 pushad 0x00000024 push ecx 0x00000025 push eax 0x00000026 push edx 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A30677 second address: 4A306AD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 jmp 00007FF008FD8876h 0x0000000a popad 0x0000000b nop 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FF008FD8877h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A306AD second address: 4A306EA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007FF008B8948Fh 0x00000008 pop eax 0x00000009 mov dh, 55h 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push dword ptr [ebp+0Ch] 0x00000011 pushad 0x00000012 push eax 0x00000013 push edx 0x00000014 pushfd 0x00000015 jmp 00007FF008B8948Ch 0x0000001a xor eax, 60A38D28h 0x00000020 jmp 00007FF008B8948Bh 0x00000025 popfd 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A3077F second address: 4A30784 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A100DF second address: 4A100E3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A100E3 second address: 4A100E9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A100E9 second address: 4A1012D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF008B8948Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xor dword ptr [esp], 31B763F9h 0x00000010 jmp 00007FF008B89490h 0x00000015 mov eax, dword ptr fs:[00000000h] 0x0000001b jmp 00007FF008B89490h 0x00000020 nop 0x00000021 push eax 0x00000022 push edx 0x00000023 push eax 0x00000024 push edx 0x00000025 push eax 0x00000026 push edx 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A1012D second address: 4A10131 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A10131 second address: 4A10135 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A10135 second address: 4A1013B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A1013B second address: 4A101A5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movzx ecx, dx 0x00000006 mov ecx, ebx 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c jmp 00007FF008B89498h 0x00000011 nop 0x00000012 jmp 00007FF008B89490h 0x00000017 sub esp, 1Ch 0x0000001a pushad 0x0000001b pushfd 0x0000001c jmp 00007FF008B8948Eh 0x00000021 sub cx, 4A88h 0x00000026 jmp 00007FF008B8948Bh 0x0000002b popfd 0x0000002c push esi 0x0000002d pushad 0x0000002e popad 0x0000002f pop edx 0x00000030 popad 0x00000031 xchg eax, ebx 0x00000032 push eax 0x00000033 push edx 0x00000034 pushad 0x00000035 mov edi, 332433D0h 0x0000003a mov ch, dh 0x0000003c popad 0x0000003d rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A101A5 second address: 4A101AB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A101AB second address: 4A101C5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FF008B8948Fh 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A101C5 second address: 4A101DD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF008FD8874h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A101DD second address: 4A101E1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A101E1 second address: 4A101F6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ebx 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FF008FD886Ah 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A101F6 second address: 4A10297 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FF008B89491h 0x00000009 jmp 00007FF008B8948Bh 0x0000000e popfd 0x0000000f movzx ecx, bx 0x00000012 popad 0x00000013 pop edx 0x00000014 pop eax 0x00000015 push ebx 0x00000016 pushad 0x00000017 pushfd 0x00000018 jmp 00007FF008B8948Eh 0x0000001d sub eax, 61B56F38h 0x00000023 jmp 00007FF008B8948Bh 0x00000028 popfd 0x00000029 mov esi, 3D84B16Fh 0x0000002e popad 0x0000002f mov dword ptr [esp], esi 0x00000032 pushad 0x00000033 mov ax, 5F67h 0x00000037 mov bl, cl 0x00000039 popad 0x0000003a push esi 0x0000003b jmp 00007FF008B89494h 0x00000040 mov dword ptr [esp], edi 0x00000043 jmp 00007FF008B89490h 0x00000048 mov eax, dword ptr [76FBB370h] 0x0000004d push eax 0x0000004e push edx 0x0000004f jmp 00007FF008B89497h 0x00000054 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A10297 second address: 4A10302 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF008FD8879h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xor dword ptr [ebp-08h], eax 0x0000000c pushad 0x0000000d movzx eax, dx 0x00000010 movsx edi, ax 0x00000013 popad 0x00000014 xor eax, ebp 0x00000016 jmp 00007FF008FD8871h 0x0000001b nop 0x0000001c pushad 0x0000001d mov bx, si 0x00000020 push eax 0x00000021 push edx 0x00000022 pushfd 0x00000023 jmp 00007FF008FD8876h 0x00000028 adc esi, 10A81248h 0x0000002e jmp 00007FF008FD886Bh 0x00000033 popfd 0x00000034 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A10302 second address: 4A1039D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF008B89498h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b pushad 0x0000000c call 00007FF008B89491h 0x00000011 call 00007FF008B89490h 0x00000016 pop eax 0x00000017 pop edi 0x00000018 pushfd 0x00000019 jmp 00007FF008B89490h 0x0000001e or cl, 00000038h 0x00000021 jmp 00007FF008B8948Bh 0x00000026 popfd 0x00000027 popad 0x00000028 nop 0x00000029 jmp 00007FF008B89496h 0x0000002e lea eax, dword ptr [ebp-10h] 0x00000031 jmp 00007FF008B89490h 0x00000036 mov dword ptr fs:[00000000h], eax 0x0000003c pushad 0x0000003d mov bx, cx 0x00000040 push eax 0x00000041 push edx 0x00000042 mov ch, 7Dh 0x00000044 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A1039D second address: 4A103B1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 mov esi, dword ptr [ebp+08h] 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007FF008FD886Ah 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A103B1 second address: 4A103B7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A103B7 second address: 4A103D8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr [esi+10h] 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FF008FD8874h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A103D8 second address: 4A103EA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF008CE334Eh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4A103EA second address: 4A1044D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF008B8736Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b test eax, eax 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 pushfd 0x00000011 jmp 00007FF008B8736Bh 0x00000016 sub ch, 0000007Eh 0x00000019 jmp 00007FF008B87379h 0x0000001e popfd 0x0000001f pushfd 0x00000020 jmp 00007FF008B87370h 0x00000025 xor ecx, 08C8B078h 0x0000002b jmp 00007FF008B8736Bh 0x00000030 popfd 0x00000031 popad 0x00000032 rdtsc |