Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: INSERT_KEY_HERE |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: 07 |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: 01 |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: 20 |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: 25 |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: GetProcAddress |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: LoadLibraryA |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: lstrcatA |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: OpenEventA |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: CreateEventA |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: CloseHandle |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: Sleep |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: GetUserDefaultLangID |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: VirtualAllocExNuma |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: VirtualFree |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: GetSystemInfo |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: VirtualAlloc |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: HeapAlloc |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: GetComputerNameA |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: lstrcpyA |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: GetProcessHeap |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: GetCurrentProcess |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: lstrlenA |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: ExitProcess |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: GlobalMemoryStatusEx |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: GetSystemTime |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: SystemTimeToFileTime |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: advapi32.dll |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: gdi32.dll |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: user32.dll |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: crypt32.dll |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: GetUserNameA |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: CreateDCA |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: GetDeviceCaps |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: ReleaseDC |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: CryptStringToBinaryA |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: sscanf |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: VMwareVMware |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: HAL9TH |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: JohnDoe |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: DISPLAY |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: %hu/%hu/%hu |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: http://185.215.113.206 |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: /c4becf79229cb002.php |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: /68b591d6548ec281/ |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: stok |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: GetEnvironmentVariableA |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: GetFileAttributesA |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: HeapFree |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: GetFileSize |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: GlobalSize |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: CreateToolhelp32Snapshot |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: IsWow64Process |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: Process32Next |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: GetLocalTime |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: FreeLibrary |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: GetTimeZoneInformation |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: GetSystemPowerStatus |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: GetVolumeInformationA |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: GetWindowsDirectoryA |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: Process32First |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: GetLocaleInfoA |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: GetUserDefaultLocaleName |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: GetModuleFileNameA |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: DeleteFileA |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: FindNextFileA |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: LocalFree |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: FindClose |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: SetEnvironmentVariableA |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: LocalAlloc |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: GetFileSizeEx |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: ReadFile |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: SetFilePointer |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: WriteFile |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: CreateFileA |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: FindFirstFileA |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: CopyFileA |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: VirtualProtect |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: GetLogicalProcessorInformationEx |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: GetLastError |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: lstrcpynA |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: MultiByteToWideChar |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: GlobalFree |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: WideCharToMultiByte |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: GlobalAlloc |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: OpenProcess |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: TerminateProcess |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: GetCurrentProcessId |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: gdiplus.dll |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: ole32.dll |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: bcrypt.dll |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: wininet.dll |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: shlwapi.dll |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: shell32.dll |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: rstrtmgr.dll |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: CreateCompatibleBitmap |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: SelectObject |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: BitBlt |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: DeleteObject |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: CreateCompatibleDC |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: GdipGetImageEncodersSize |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: GdipGetImageEncoders |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: GdipCreateBitmapFromHBITMAP |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: GdiplusStartup |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: GdiplusShutdown |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: GdipSaveImageToStream |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: GdipDisposeImage |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: GdipFree |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: GetHGlobalFromStream |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: CreateStreamOnHGlobal |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: CoUninitialize |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: CoInitialize |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: CoCreateInstance |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: BCryptGenerateSymmetricKey |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: BCryptCloseAlgorithmProvider |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: BCryptDecrypt |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: BCryptSetProperty |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: BCryptDestroyKey |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: BCryptOpenAlgorithmProvider |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: GetWindowRect |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: GetDesktopWindow |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: GetDC |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: CloseWindow |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: wsprintfA |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: EnumDisplayDevicesA |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: GetKeyboardLayoutList |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: CharToOemW |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: wsprintfW |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: RegQueryValueExA |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: RegEnumKeyExA |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: RegOpenKeyExA |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: RegCloseKey |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: RegEnumValueA |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: CryptBinaryToStringA |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: CryptUnprotectData |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: SHGetFolderPathA |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: ShellExecuteExA |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: InternetOpenUrlA |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: InternetConnectA |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: InternetCloseHandle |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: HttpSendRequestA |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: HttpOpenRequestA |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: InternetReadFile |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: InternetCrackUrlA |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: StrCmpCA |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: StrStrA |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: StrCmpCW |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: PathMatchSpecA |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: GetModuleFileNameExA |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: RmStartSession |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: RmRegisterResources |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: RmGetList |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: RmEndSession |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: sqlite3_open |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: sqlite3_prepare_v2 |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: sqlite3_step |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: sqlite3_column_text |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: sqlite3_finalize |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: sqlite3_close |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: sqlite3_column_bytes |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: sqlite3_column_blob |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: encrypted_key |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: PATH |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: C:\ProgramData\nss3.dll |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: NSS_Init |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: NSS_Shutdown |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: PK11_GetInternalKeySlot |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: PK11_FreeSlot |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: PK11_Authenticate |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: PK11SDR_Decrypt |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: C:\ProgramData\ |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: SELECT origin_url, username_value, password_value FROM logins |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: browser: |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: profile: |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: url: |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: login: |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: password: |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: Opera |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: OperaGX |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: Network |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: cookies |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: .txt |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: SELECT HOST_KEY, is_httponly, path, is_secure, (expires_utc/1000000)-11644480800, name, encrypted_value from cookies |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: TRUE |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: FALSE |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: autofill |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: history |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: SELECT url FROM urls LIMIT 1000 |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: cc |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: SELECT name_on_card, expiration_month, expiration_year, card_number_encrypted FROM credit_cards |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: name: |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: month: |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: year: |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: card: |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: Cookies |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: Login Data |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: Web Data |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: History |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: logins.json |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: formSubmitURL |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: usernameField |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: encryptedUsername |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: encryptedPassword |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: guid |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: SELECT host, isHttpOnly, path, isSecure, expiry, name, value FROM moz_cookies |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: SELECT fieldname, value FROM moz_formhistory |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: SELECT url FROM moz_places LIMIT 1000 |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: cookies.sqlite |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: formhistory.sqlite |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: places.sqlite |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: plugins |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: Local Extension Settings |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: Sync Extension Settings |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: IndexedDB |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: Opera Stable |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: Opera GX Stable |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: CURRENT |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: chrome-extension_ |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: _0.indexeddb.leveldb |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: Local State |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: profiles.ini |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: chrome |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: opera |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: firefox |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: wallets |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: %08lX%04lX%lu |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: SOFTWARE\Microsoft\Windows NT\CurrentVersion |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: ProductName |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: x32 |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: x64 |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: %d/%d/%d %d:%d:%d |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: HARDWARE\DESCRIPTION\System\CentralProcessor\0 |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: DisplayName |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: DisplayVersion |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: Network Info: |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: - IP: IP? |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: - Country: ISO? |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: System Summary: |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: - HWID: |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: - OS: |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: - Architecture: |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: - UserName: |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: - Computer Name: |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: - Local Time: |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: - UTC: |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: - Language: |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: - Keyboards: |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: - Laptop: |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: - Running Path: |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: - CPU: |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: - Threads: |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: - Cores: |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: - RAM: |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: - Display Resolution: |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: - GPU: |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: User Agents: |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: Installed Apps: |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: All Users: |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: Current User: |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: Process List: |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: system_info.txt |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: freebl3.dll |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: mozglue.dll |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: msvcp140.dll |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: nss3.dll |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: softokn3.dll |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: vcruntime140.dll |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: \Temp\ |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: .exe |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: runas |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: open |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: /c start |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: %DESKTOP% |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: %APPDATA% |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: %LOCALAPPDATA% |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: %USERPROFILE% |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: %DOCUMENTS% |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: %PROGRAMFILES_86% |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: %RECENT% |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: *.lnk |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: files |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: \discord\ |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: \Local Storage\leveldb\CURRENT |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: \Local Storage\leveldb |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: \Telegram Desktop\ |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: key_datas |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: D877F783D5D3EF8C* |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: map* |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: A7FDF864FBC10B77* |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: A92DAA6EA6F891F2* |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: F8806DD0C461824F* |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: Telegram |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: Tox |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: *.tox |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: *.ini |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: Password |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\ |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: Software\Microsoft\Office\13.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\ |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: Software\Microsoft\Office\14.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\ |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\ |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\ |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: oftware\Microsoft\Windows Messaging Subsystem\Profiles\9375CFF0413111d3B88A00104B2A6676\ |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: 00000001 |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: 00000002 |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: 00000003 |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: 00000004 |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: \Outlook\accounts.txt |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: Pidgin |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: \.purple\ |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: accounts.xml |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: dQw4w9WgXcQ |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: token: |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: Software\Valve\Steam |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: SteamPath |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: \config\ |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: ssfn* |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: config.vdf |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: DialogConfig.vdf |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: DialogConfigOverlay*.vdf |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: libraryfolders.vdf |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: loginusers.vdf |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: \Steam\ |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: sqlite3.dll |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: done |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: soft |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: \Discord\tokens.txt |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: /c timeout /t 5 & del /f /q " |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: " & del "C:\ProgramData\*.dll"" & exit |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: C:\Windows\system32\cmd.exe |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: https |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: Content-Type: multipart/form-data; boundary=---- |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: POST |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: HTTP/1.1 |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: Content-Disposition: form-data; name=" |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: hwid |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: build |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: token |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: file_name |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: file |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: message |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: ABCDEFGHIJKLMNOPQRSTUVWXYZ1234567890 |
Source: 0.2.random(6).exe.290000.0.unpack | String decryptor: screenshot.jpg |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_002AE330 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,CopyFileA,lstrcpy,lstrcpy,DeleteFileA,FindNextFileA,FindClose, | 0_2_002AE330 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_002915A0 lstrcpy,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrcpy,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,GetFileAttributesA,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrcpy,CopyFileA,lstrcpy,lstrcpy,DeleteFileA,FindNextFileA,FindClose, | 0_2_002915A0 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_002A15C0 lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,StrCmpCA,lstrcpy,lstrcpy,lstrcpy,StrCmpCA,lstrcpy,lstrcpy,lstrcpy,StrCmpCA,lstrcpy,lstrcpy,lstrcpy,StrCmpCA,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,FindNextFileA,FindClose, | 0_2_002A15C0 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_002AD640 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcpy,lstrcpy,FindNextFileA,FindClose, | 0_2_002AD640 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_002A2730 lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,StrCmpCA,lstrlen,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,GetFileAttributesA,StrCmpCA,lstrlen,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,GetFileAttributesA,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,GetFileAttributesA,lstrcpy,lstrcpy,lstrcpy,lstrcpy,FindNextFileA, | 0_2_002A2730 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_002A1C40 lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcpy,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,CopyFileA,lstrcpy,lstrcpy,DeleteFileA,FindNextFileA,FindClose, | 0_2_002A1C40 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_002ACCE0 wsprintfA,FindFirstFileA,lstrcat,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcat,lstrlen,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,CreateFileA,GetFileSizeEx,CloseHandle,CloseHandle,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,lstrcpy,lstrcpy,DeleteFileA,FindNextFileA,FindClose, | 0_2_002ACCE0 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_002A3CC0 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,DeleteFileA,CopyFileA,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,FindNextFileA,FindClose, | 0_2_002A3CC0 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0029DD70 lstrcpy,lstrcpy,lstrcpy,lstrcpy,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlen,lstrcpy,lstrcpy,lstrcpy,lstrcpy,StrCmpCA,StrCmpCA,lstrcpy,lstrcpy,CopyFileA,lstrcpy,lstrcpy,lstrcpy,lstrcpy,DeleteFileA,StrCmpCA,lstrcpy,lstrcpy,lstrcpy,StrCmpCA,StrCmpCA,lstrcpy,StrCmpCA,lstrcpy,CopyFileA,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,StrCmpCA,DeleteFileA,StrCmpCA,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,FindNextFileA,FindClose, | 0_2_0029DD70 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_002ADE50 GetProcessHeap,RtlAllocateHeap,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcat,lstrcat,lstrlen,lstrlen,lstrcpy, | 0_2_002ADE50 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_002A4EC0 lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,StrCmpCA,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,CopyFileA,lstrcpy,CopyFileA,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,DeleteFileA,lstrcpy,lstrcpy,lstrcpy,FindNextFileA,FindClose, | 0_2_002A4EC0 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005F405E | 0_2_005F405E |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00514052 | 0_2_00514052 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005AA051 | 0_2_005AA051 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00511040 | 0_2_00511040 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0057B040 | 0_2_0057B040 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005EE046 | 0_2_005EE046 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00607078 | 0_2_00607078 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0062807E | 0_2_0062807E |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0055D04A | 0_2_0055D04A |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00590046 | 0_2_00590046 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00540074 | 0_2_00540074 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0056C072 | 0_2_0056C072 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00525065 | 0_2_00525065 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005D7065 | 0_2_005D7065 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_004E800F | 0_2_004E800F |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00635025 | 0_2_00635025 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00584010 | 0_2_00584010 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005D6010 | 0_2_005D6010 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00531002 | 0_2_00531002 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0061C030 | 0_2_0061C030 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005B5001 | 0_2_005B5001 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00594007 | 0_2_00594007 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0059C032 | 0_2_0059C032 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005D5031 | 0_2_005D5031 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005F2031 | 0_2_005F2031 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005E5028 | 0_2_005E5028 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005B102C | 0_2_005B102C |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0055902E | 0_2_0055902E |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005AD027 | 0_2_005AD027 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0050D0DF | 0_2_0050D0DF |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005300C1 | 0_2_005300C1 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_006080F2 | 0_2_006080F2 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0063A0FD | 0_2_0063A0FD |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005220F6 | 0_2_005220F6 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0054C0F2 | 0_2_0054C0F2 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_006100C7 | 0_2_006100C7 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_004EF0E9 | 0_2_004EF0E9 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005810FF | 0_2_005810FF |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0051B0FF | 0_2_0051B0FF |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005DE0EA | 0_2_005DE0EA |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005570E8 | 0_2_005570E8 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005580EB | 0_2_005580EB |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005FF09B | 0_2_005FF09B |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005F508F | 0_2_005F508F |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0057708D | 0_2_0057708D |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0054708F | 0_2_0054708F |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005760B4 | 0_2_005760B4 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005660B3 | 0_2_005660B3 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_004FA0A5 | 0_2_004FA0A5 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005F10B1 | 0_2_005F10B1 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005E20AC | 0_2_005E20AC |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005180A6 | 0_2_005180A6 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005C90A3 | 0_2_005C90A3 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0060909F | 0_2_0060909F |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00531152 | 0_2_00531152 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0061E178 | 0_2_0061E178 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_004F9155 | 0_2_004F9155 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00502175 | 0_2_00502175 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0054117F | 0_2_0054117F |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00633152 | 0_2_00633152 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005C216A | 0_2_005C216A |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0062D15A | 0_2_0062D15A |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00592162 | 0_2_00592162 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0060D15D | 0_2_0060D15D |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005BD118 | 0_2_005BD118 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00598111 | 0_2_00598111 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005BA113 | 0_2_005BA113 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005C310C | 0_2_005C310C |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0058F10B | 0_2_0058F10B |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0052F108 | 0_2_0052F108 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0054E136 | 0_2_0054E136 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0058B13C | 0_2_0058B13C |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00636106 | 0_2_00636106 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_004EE122 | 0_2_004EE122 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0050913D | 0_2_0050913D |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0061711C | 0_2_0061711C |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005791D6 | 0_2_005791D6 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_004F31C9 | 0_2_004F31C9 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0054D1D2 | 0_2_0054D1D2 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005FC1D9 | 0_2_005FC1D9 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_006211EF | 0_2_006211EF |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005681C7 | 0_2_005681C7 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005041C5 | 0_2_005041C5 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_004F11D9 | 0_2_004F11D9 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005B01CC | 0_2_005B01CC |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0055E1C8 | 0_2_0055E1C8 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005431CA | 0_2_005431CA |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005CD1FC | 0_2_005CD1FC |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005441F3 | 0_2_005441F3 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005A91F2 | 0_2_005A91F2 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_004F51FF | 0_2_004F51FF |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0058A1ED | 0_2_0058A1ED |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_006011D5 | 0_2_006011D5 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0064D1D9 | 0_2_0064D1D9 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005131EE | 0_2_005131EE |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_004FB187 | 0_2_004FB187 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00545187 | 0_2_00545187 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005D618E | 0_2_005D618E |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005FA187 | 0_2_005FA187 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005B1187 | 0_2_005B1187 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005BF186 | 0_2_005BF186 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00638183 | 0_2_00638183 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00655187 | 0_2_00655187 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0050C1B2 | 0_2_0050C1B2 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005971B1 | 0_2_005971B1 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005AE1B1 | 0_2_005AE1B1 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0061318F | 0_2_0061318F |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00604197 | 0_2_00604197 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0058E1A0 | 0_2_0058E1A0 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005241A8 | 0_2_005241A8 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00506252 | 0_2_00506252 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00536250 | 0_2_00536250 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0058925C | 0_2_0058925C |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0059D25D | 0_2_0059D25D |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00527255 | 0_2_00527255 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0061D269 | 0_2_0061D269 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0050B24C | 0_2_0050B24C |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005C627F | 0_2_005C627F |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005B9272 | 0_2_005B9272 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00611248 | 0_2_00611248 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_004EC27B | 0_2_004EC27B |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00646259 | 0_2_00646259 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0060C25E | 0_2_0060C25E |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0056F211 | 0_2_0056F211 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005F920D | 0_2_005F920D |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005FD208 | 0_2_005FD208 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0059B201 | 0_2_0059B201 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005B223B | 0_2_005B223B |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0063B200 | 0_2_0063B200 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0061F212 | 0_2_0061F212 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00583221 | 0_2_00583221 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_004FA235 | 0_2_004FA235 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005E42DF | 0_2_005E42DF |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005DC2D9 | 0_2_005DC2D9 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_006022E5 | 0_2_006022E5 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0054A2DF | 0_2_0054A2DF |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005AF2D5 | 0_2_005AF2D5 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005302C1 | 0_2_005302C1 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_006392F5 | 0_2_006392F5 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005BB2C7 | 0_2_005BB2C7 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005B72FB | 0_2_005B72FB |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005E92FD | 0_2_005E92FD |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_006052C5 | 0_2_006052C5 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005992F3 | 0_2_005992F3 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005F72ED | 0_2_005F72ED |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005622E3 | 0_2_005622E3 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0062F2DE | 0_2_0062F2DE |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005CA2E1 | 0_2_005CA2E1 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_004EB288 | 0_2_004EB288 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005F328C | 0_2_005F328C |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005E728A | 0_2_005E728A |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0052A284 | 0_2_0052A284 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0061A2BD | 0_2_0061A2BD |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005DD2BF | 0_2_005DD2BF |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0056A2B5 | 0_2_0056A2B5 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005002B7 | 0_2_005002B7 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0056E2B8 | 0_2_0056E2B8 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005702B9 | 0_2_005702B9 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_004F62B4 | 0_2_004F62B4 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0055C2AE | 0_2_0055C2AE |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005B6355 | 0_2_005B6355 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_004F835B | 0_2_004F835B |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0062A341 | 0_2_0062A341 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_004F3369 | 0_2_004F3369 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_004FE361 | 0_2_004FE361 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005DE372 | 0_2_005DE372 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0058C369 | 0_2_0058C369 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005BC36E | 0_2_005BC36E |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005E5368 | 0_2_005E5368 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00634358 | 0_2_00634358 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0052B36C | 0_2_0052B36C |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0060A323 | 0_2_0060A323 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005C7319 | 0_2_005C7319 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0050D318 | 0_2_0050D318 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005D3316 | 0_2_005D3316 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005ED313 | 0_2_005ED313 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005A3309 | 0_2_005A3309 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0053430B | 0_2_0053430B |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0063E338 | 0_2_0063E338 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00632303 | 0_2_00632303 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0051D333 | 0_2_0051D333 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005FE332 | 0_2_005FE332 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005EF32B | 0_2_005EF32B |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0053D329 | 0_2_0053D329 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005393D2 | 0_2_005393D2 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005383D1 | 0_2_005383D1 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005713DE | 0_2_005713DE |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005E03D7 | 0_2_005E03D7 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005233C1 | 0_2_005233C1 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0054B3C2 | 0_2_0054B3C2 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005FF3C3 | 0_2_005FF3C3 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0054C3CA | 0_2_0054C3CA |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0053A3F1 | 0_2_0053A3F1 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005E13FC | 0_2_005E13FC |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0062C3C4 | 0_2_0062C3C4 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005B33F3 | 0_2_005B33F3 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_006113CD | 0_2_006113CD |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005F13F0 | 0_2_005F13F0 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005853E9 | 0_2_005853E9 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0058D398 | 0_2_0058D398 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0053F392 | 0_2_0053F392 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005EC39C | 0_2_005EC39C |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_006413A8 | 0_2_006413A8 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_006293AE | 0_2_006293AE |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00542381 | 0_2_00542381 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0060F3B9 | 0_2_0060F3B9 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005D0386 | 0_2_005D0386 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00586385 | 0_2_00586385 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005EE383 | 0_2_005EE383 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00608387 | 0_2_00608387 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_004F73A3 | 0_2_004F73A3 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005F43B3 | 0_2_005F43B3 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005083A2 | 0_2_005083A2 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00612460 | 0_2_00612460 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00516452 | 0_2_00516452 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005E445D | 0_2_005E445D |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0057C45F | 0_2_0057C45F |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0058B451 | 0_2_0058B451 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0063C46A | 0_2_0063C46A |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0050A45A | 0_2_0050A45A |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0062046E | 0_2_0062046E |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0053E45D | 0_2_0053E45D |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005DA453 | 0_2_005DA453 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0063346C | 0_2_0063346C |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00512471 | 0_2_00512471 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005C247F | 0_2_005C247F |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00626448 | 0_2_00626448 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005A6476 | 0_2_005A6476 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0056147B | 0_2_0056147B |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0052C47C | 0_2_0052C47C |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0051B47E | 0_2_0051B47E |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005AD468 | 0_2_005AD468 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0057D463 | 0_2_0057D463 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005D8469 | 0_2_005D8469 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0059E460 | 0_2_0059E460 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005D7467 | 0_2_005D7467 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005AC461 | 0_2_005AC461 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0057B46B | 0_2_0057B46B |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0056946B | 0_2_0056946B |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00575417 | 0_2_00575417 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00632423 | 0_2_00632423 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005CB418 | 0_2_005CB418 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005BD40C | 0_2_005BD40C |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0058743E | 0_2_0058743E |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0060E407 | 0_2_0060E407 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00630412 | 0_2_00630412 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00526421 | 0_2_00526421 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005B8428 | 0_2_005B8428 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00600415 | 0_2_00600415 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0062A414 | 0_2_0062A414 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0062341E | 0_2_0062341E |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_004E9430 | 0_2_004E9430 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005FD4DC | 0_2_005FD4DC |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005D44DA | 0_2_005D44DA |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005C14D1 | 0_2_005C14D1 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_006154F1 | 0_2_006154F1 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_006284F3 | 0_2_006284F3 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005114C5 | 0_2_005114C5 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0057E4C3 | 0_2_0057E4C3 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_006384F4 | 0_2_006384F4 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_006364C3 | 0_2_006364C3 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0054F4F5 | 0_2_0054F4F5 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_006244C4 | 0_2_006244C4 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0064B4D6 | 0_2_0064B4D6 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005904ED | 0_2_005904ED |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_004FF4FA | 0_2_004FF4FA |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005B14E3 | 0_2_005B14E3 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005F84E7 | 0_2_005F84E7 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005664EF | 0_2_005664EF |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005594E9 | 0_2_005594E9 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_004F448E | 0_2_004F448E |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005BC499 | 0_2_005BC499 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00584494 | 0_2_00584494 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_004F549D | 0_2_004F549D |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005D1488 | 0_2_005D1488 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0050D4B0 | 0_2_0050D4B0 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00606482 | 0_2_00606482 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00635487 | 0_2_00635487 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005254BB | 0_2_005254BB |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005654B8 | 0_2_005654B8 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005174A5 | 0_2_005174A5 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005D94A1 | 0_2_005D94A1 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_004F04B2 | 0_2_004F04B2 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0050C556 | 0_2_0050C556 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005E3552 | 0_2_005E3552 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005F3552 | 0_2_005F3552 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00541545 | 0_2_00541545 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005FA545 | 0_2_005FA545 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0063A57E | 0_2_0063A57E |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00552570 | 0_2_00552570 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0059F570 | 0_2_0059F570 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005E056E | 0_2_005E056E |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0056F56A | 0_2_0056F56A |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005BA567 | 0_2_005BA567 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005A8567 | 0_2_005A8567 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00503511 | 0_2_00503511 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0051E513 | 0_2_0051E513 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0057F515 | 0_2_0057F515 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00577514 | 0_2_00577514 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0061E525 | 0_2_0061E525 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00616529 | 0_2_00616529 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005F2512 | 0_2_005F2512 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0054051A | 0_2_0054051A |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005E6510 | 0_2_005E6510 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00556506 | 0_2_00556506 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0058850D | 0_2_0058850D |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0052750F | 0_2_0052750F |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005CE502 | 0_2_005CE502 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0051A531 | 0_2_0051A531 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00601503 | 0_2_00601503 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005A553E | 0_2_005A553E |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0058353F | 0_2_0058353F |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0060750C | 0_2_0060750C |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00610515 | 0_2_00610515 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005A152D | 0_2_005A152D |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_004EF534 | 0_2_004EF534 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005725DF | 0_2_005725DF |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0058F5D0 | 0_2_0058F5D0 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0058E5D3 | 0_2_0058E5D3 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005A35D7 | 0_2_005A35D7 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005485DB | 0_2_005485DB |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005ED5FF | 0_2_005ED5FF |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005095ED | 0_2_005095ED |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0057A5E8 | 0_2_0057A5E8 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00579597 | 0_2_00579597 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00513599 | 0_2_00513599 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005CD593 | 0_2_005CD593 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0050B580 | 0_2_0050B580 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00597589 | 0_2_00597589 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00546587 | 0_2_00546587 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0076E5A3 | 0_2_0076E5A3 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00591582 | 0_2_00591582 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0051F5B5 | 0_2_0051F5B5 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0060358E | 0_2_0060358E |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005545BA | 0_2_005545BA |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005BE65C | 0_2_005BE65C |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00621665 | 0_2_00621665 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0060266A | 0_2_0060266A |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0056A659 | 0_2_0056A659 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0063E66C | 0_2_0063E66C |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_004FA65D | 0_2_004FA65D |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00589641 | 0_2_00589641 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00530670 | 0_2_00530670 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005F766E | 0_2_005F766E |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0060A65F | 0_2_0060A65F |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005BF61B | 0_2_005BF61B |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005C0611 | 0_2_005C0611 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005C8612 | 0_2_005C8612 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005A4600 | 0_2_005A4600 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005D663E | 0_2_005D663E |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0055F630 | 0_2_0055F630 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00622613 | 0_2_00622613 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005C7625 | 0_2_005C7625 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005A9625 | 0_2_005A9625 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0061A6E1 | 0_2_0061A6E1 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0053B6D0 | 0_2_0053B6D0 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005936DE | 0_2_005936DE |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0058A6D5 | 0_2_0058A6D5 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0055E6C4 | 0_2_0055E6C4 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005326FB | 0_2_005326FB |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0061B6CB | 0_2_0061B6CB |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005506FA | 0_2_005506FA |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0054A6E5 | 0_2_0054A6E5 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005C66ED | 0_2_005C66ED |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0052D6E0 | 0_2_0052D6E0 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005686E3 | 0_2_005686E3 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005BD6E7 | 0_2_005BD6E7 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005EB6E3 | 0_2_005EB6E3 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00533693 | 0_2_00533693 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005A6699 | 0_2_005A6699 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0063F6AB | 0_2_0063F6AB |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_006446B7 | 0_2_006446B7 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_006096B4 | 0_2_006096B4 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005076B0 | 0_2_005076B0 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005EA6BD | 0_2_005EA6BD |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005DC6B8 | 0_2_005DC6B8 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005216BE | 0_2_005216BE |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005606BA | 0_2_005606BA |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0054D6BA | 0_2_0054D6BA |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005AA6B5 | 0_2_005AA6B5 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0062D69B | 0_2_0062D69B |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00630765 | 0_2_00630765 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00578750 | 0_2_00578750 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005A375D | 0_2_005A375D |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00625765 | 0_2_00625765 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00501748 | 0_2_00501748 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00618779 | 0_2_00618779 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0052F749 | 0_2_0052F749 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0058C745 | 0_2_0058C745 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005D577D | 0_2_005D577D |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005D3779 | 0_2_005D3779 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0060C746 | 0_2_0060C746 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005EE776 | 0_2_005EE776 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005B7770 | 0_2_005B7770 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0062774E | 0_2_0062774E |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0060B754 | 0_2_0060B754 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00608721 | 0_2_00608721 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0057A71D | 0_2_0057A71D |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00518709 | 0_2_00518709 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005E9707 | 0_2_005E9707 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0060573E | 0_2_0060573E |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005F673F | 0_2_005F673F |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005BB739 | 0_2_005BB739 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0062B701 | 0_2_0062B701 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0057573B | 0_2_0057573B |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0059D735 | 0_2_0059D735 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0056E726 | 0_2_0056E726 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005A2724 | 0_2_005A2724 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005FF7DA | 0_2_005FF7DA |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005F87D6 | 0_2_005F87D6 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005387DF | 0_2_005387DF |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0055C7DB | 0_2_0055C7DB |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005DE7CC | 0_2_005DE7CC |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_006217F0 | 0_2_006217F0 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005677C5 | 0_2_005677C5 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005AD7CF | 0_2_005AD7CF |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005287CE | 0_2_005287CE |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005AB7C6 | 0_2_005AB7C6 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005067F0 | 0_2_005067F0 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005BE7F1 | 0_2_005BE7F1 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005857F4 | 0_2_005857F4 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0051C7E3 | 0_2_0051C7E3 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005497EC | 0_2_005497EC |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0056B7ED | 0_2_0056B7ED |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005E579D | 0_2_005E579D |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0061C7B3 | 0_2_0061C7B3 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005C5789 | 0_2_005C5789 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005F9788 | 0_2_005F9788 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0053C789 | 0_2_0053C789 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0050478C | 0_2_0050478C |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0056478A | 0_2_0056478A |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0063C781 | 0_2_0063C781 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0052E7BB | 0_2_0052E7BB |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005697BF | 0_2_005697BF |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005B47B5 | 0_2_005B47B5 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005C07B2 | 0_2_005C07B2 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005667A7 | 0_2_005667A7 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005817A9 | 0_2_005817A9 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005437A6 | 0_2_005437A6 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_004E87B3 | 0_2_004E87B3 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0057D857 | 0_2_0057D857 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0058485F | 0_2_0058485F |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0051A858 | 0_2_0051A858 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0060686A | 0_2_0060686A |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0058D856 | 0_2_0058D856 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0063887F | 0_2_0063887F |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00637844 | 0_2_00637844 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00508879 | 0_2_00508879 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0054387D | 0_2_0054387D |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005F5875 | 0_2_005F5875 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0050D87B | 0_2_0050D87B |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0053B86E | 0_2_0053B86E |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005C3814 | 0_2_005C3814 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0060F82C | 0_2_0060F82C |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00600830 | 0_2_00600830 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0053F802 | 0_2_0053F802 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005C2809 | 0_2_005C2809 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005D7804 | 0_2_005D7804 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005D8807 | 0_2_005D8807 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0055280B | 0_2_0055280B |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005A583F | 0_2_005A583F |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0053E835 | 0_2_0053E835 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0053483B | 0_2_0053483B |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00523828 | 0_2_00523828 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0063B819 | 0_2_0063B819 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0061181A | 0_2_0061181A |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_006318E2 | 0_2_006318E2 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005598D7 | 0_2_005598D7 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005B88D1 | 0_2_005B88D1 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005ED8C9 | 0_2_005ED8C9 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0054C8CD | 0_2_0054C8CD |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005128CF | 0_2_005128CF |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005A18C5 | 0_2_005A18C5 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0050B8F0 | 0_2_0050B8F0 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0061E8C2 | 0_2_0061E8C2 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0050A8FA | 0_2_0050A8FA |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005168FB | 0_2_005168FB |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0053A8F8 | 0_2_0053A8F8 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005458FA | 0_2_005458FA |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005B18EF | 0_2_005B18EF |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0062F8D6 | 0_2_0062F8D6 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005908EC | 0_2_005908EC |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005F08E9 | 0_2_005F08E9 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_006228D8 | 0_2_006228D8 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005298E9 | 0_2_005298E9 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005A68E1 | 0_2_005A68E1 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005F289D | 0_2_005F289D |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_004EC88B | 0_2_004EC88B |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005C189B | 0_2_005C189B |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_006348B3 | 0_2_006348B3 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005A288B | 0_2_005A288B |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0054B886 | 0_2_0054B886 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005BA88F | 0_2_005BA88F |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005E488B | 0_2_005E488B |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0054088D | 0_2_0054088D |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0053588F | 0_2_0053588F |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_00607885 | 0_2_00607885 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005BC8B1 | 0_2_005BC8B1 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005888AE | 0_2_005888AE |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_005798AE | 0_2_005798AE |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 4E0540 second address: 4DFD5B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 nop 0x00000006 pushad 0x00000007 add ebx, dword ptr [ebp+122D3B62h] 0x0000000d movsx eax, dx 0x00000010 popad 0x00000011 push dword ptr [ebp+122D02A1h] 0x00000017 mov dword ptr [ebp+122D3719h], esi 0x0000001d call dword ptr [ebp+122D3653h] 0x00000023 pushad 0x00000024 cld 0x00000025 xor eax, eax 0x00000027 clc 0x00000028 mov edx, dword ptr [esp+28h] 0x0000002c jmp 00007F36704F9B6Bh 0x00000031 mov dword ptr [ebp+122D3A3Ah], eax 0x00000037 pushad 0x00000038 clc 0x00000039 jnl 00007F36704F9B6Ch 0x0000003f popad 0x00000040 sub dword ptr [ebp+122D2622h], edi 0x00000046 mov esi, 0000003Ch 0x0000004b clc 0x0000004c add esi, dword ptr [esp+24h] 0x00000050 jp 00007F36704F9B67h 0x00000056 lodsw 0x00000058 stc 0x00000059 add eax, dword ptr [esp+24h] 0x0000005d jmp 00007F36704F9B72h 0x00000062 jnl 00007F36704F9B71h 0x00000068 mov ebx, dword ptr [esp+24h] 0x0000006c jmp 00007F36704F9B75h 0x00000071 push eax 0x00000072 push ecx 0x00000073 push eax 0x00000074 push edx 0x00000075 jl 00007F36704F9B66h 0x0000007b rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 652CDB second address: 652CE0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 652DFD second address: 652E31 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 je 00007F36704F9B66h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F36704F9B72h 0x00000013 jmp 00007F36704F9B74h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 652E31 second address: 652E3B instructions: 0x00000000 rdtsc 0x00000002 jno 00007F367110D246h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 652E3B second address: 652E41 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 652E41 second address: 652E4B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007F367110D246h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 652F97 second address: 652FE3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F36704F9B6Fh 0x00000008 pushad 0x00000009 popad 0x0000000a popad 0x0000000b pushad 0x0000000c jmp 00007F36704F9B75h 0x00000011 ja 00007F36704F9B66h 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a pushad 0x0000001b push eax 0x0000001c push edx 0x0000001d jmp 00007F36704F9B75h 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 652FE3 second address: 65301E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F367110D24Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F367110D253h 0x00000010 jmp 00007F367110D253h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 653198 second address: 65319E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 65319E second address: 6531AA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push edi 0x00000007 pop edi 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6531AA second address: 6531AF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6531AF second address: 6531B8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push esi 0x00000004 pop esi 0x00000005 push esi 0x00000006 pop esi 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 653475 second address: 65347B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 657081 second address: 6570CD instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edi 0x00000007 mov eax, dword ptr [eax] 0x00000009 pushad 0x0000000a push edx 0x0000000b jnl 00007F367110D246h 0x00000011 pop edx 0x00000012 jmp 00007F367110D256h 0x00000017 popad 0x00000018 mov dword ptr [esp+04h], eax 0x0000001c pushad 0x0000001d jmp 00007F367110D24Dh 0x00000022 pushad 0x00000023 jmp 00007F367110D24Eh 0x00000028 push eax 0x00000029 push edx 0x0000002a rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6570CD second address: 4DFD5B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 pop eax 0x00000007 mov edi, 6480DD05h 0x0000000c push dword ptr [ebp+122D02A1h] 0x00000012 jmp 00007F36704F9B79h 0x00000017 mov ch, 7Fh 0x00000019 call dword ptr [ebp+122D3653h] 0x0000001f pushad 0x00000020 cld 0x00000021 xor eax, eax 0x00000023 clc 0x00000024 mov edx, dword ptr [esp+28h] 0x00000028 jmp 00007F36704F9B6Bh 0x0000002d mov dword ptr [ebp+122D3A3Ah], eax 0x00000033 pushad 0x00000034 clc 0x00000035 jnl 00007F36704F9B6Ch 0x0000003b popad 0x0000003c sub dword ptr [ebp+122D2622h], edi 0x00000042 mov esi, 0000003Ch 0x00000047 clc 0x00000048 add esi, dword ptr [esp+24h] 0x0000004c jp 00007F36704F9B67h 0x00000052 lodsw 0x00000054 stc 0x00000055 add eax, dword ptr [esp+24h] 0x00000059 jmp 00007F36704F9B72h 0x0000005e jnl 00007F36704F9B71h 0x00000064 mov ebx, dword ptr [esp+24h] 0x00000068 jmp 00007F36704F9B75h 0x0000006d push eax 0x0000006e push ecx 0x0000006f push eax 0x00000070 push edx 0x00000071 jl 00007F36704F9B66h 0x00000077 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 657111 second address: 65717F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F367110D24Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jmp 00007F367110D24Eh 0x0000000f nop 0x00000010 push 00000000h 0x00000012 jmp 00007F367110D253h 0x00000017 call 00007F367110D256h 0x0000001c jmp 00007F367110D251h 0x00000021 pop edi 0x00000022 push 17DDA7C9h 0x00000027 pushad 0x00000028 push eax 0x00000029 push edx 0x0000002a jnl 00007F367110D246h 0x00000030 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 657301 second address: 65738B instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 pop eax 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 nop 0x00000009 mov si, 713Bh 0x0000000d push 00000000h 0x0000000f sub dword ptr [ebp+122D2B39h], esi 0x00000015 mov dword ptr [ebp+122D3594h], eax 0x0000001b push F779ACBDh 0x00000020 jmp 00007F36704F9B6Eh 0x00000025 add dword ptr [esp], 088653C3h 0x0000002c mov ecx, dword ptr [ebp+122D3B56h] 0x00000032 push 00000003h 0x00000034 push 00000000h 0x00000036 push ebp 0x00000037 call 00007F36704F9B68h 0x0000003c pop ebp 0x0000003d mov dword ptr [esp+04h], ebp 0x00000041 add dword ptr [esp+04h], 00000015h 0x00000049 inc ebp 0x0000004a push ebp 0x0000004b ret 0x0000004c pop ebp 0x0000004d ret 0x0000004e jmp 00007F36704F9B6Ah 0x00000053 push 00000000h 0x00000055 sbb di, AB49h 0x0000005a or dword ptr [ebp+122D2B39h], edi 0x00000060 push 00000003h 0x00000062 adc cl, FFFFFFCDh 0x00000065 mov dword ptr [ebp+122D2BD5h], ebx 0x0000006b push 93340CEFh 0x00000070 jnl 00007F36704F9B6Eh 0x00000076 push edx 0x00000077 push eax 0x00000078 push edx 0x00000079 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 65738B second address: 6573D4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 xor dword ptr [esp], 53340CEFh 0x0000000c and edx, 0C84BB5Ch 0x00000012 lea ebx, dword ptr [ebp+1244AFA8h] 0x00000018 push 00000000h 0x0000001a push eax 0x0000001b call 00007F367110D248h 0x00000020 pop eax 0x00000021 mov dword ptr [esp+04h], eax 0x00000025 add dword ptr [esp+04h], 00000018h 0x0000002d inc eax 0x0000002e push eax 0x0000002f ret 0x00000030 pop eax 0x00000031 ret 0x00000032 mov dword ptr [ebp+122D3687h], ecx 0x00000038 xchg eax, ebx 0x00000039 pushad 0x0000003a pushad 0x0000003b jg 00007F367110D246h 0x00000041 push eax 0x00000042 push edx 0x00000043 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6573D4 second address: 657405 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007F36704F9B6Eh 0x0000000a popad 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f jmp 00007F36704F9B76h 0x00000014 pushad 0x00000015 popad 0x00000016 popad 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 65750A second address: 65750E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 65750E second address: 657525 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F36704F9B6Ah 0x0000000b popad 0x0000000c push eax 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 657525 second address: 65752E instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 65752E second address: 6575D9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 popad 0x00000007 popad 0x00000008 mov eax, dword ptr [esp+04h] 0x0000000c jng 00007F36704F9B74h 0x00000012 mov eax, dword ptr [eax] 0x00000014 pushad 0x00000015 jmp 00007F36704F9B71h 0x0000001a push eax 0x0000001b jne 00007F36704F9B66h 0x00000021 pop eax 0x00000022 popad 0x00000023 mov dword ptr [esp+04h], eax 0x00000027 jmp 00007F36704F9B78h 0x0000002c pop eax 0x0000002d push 00000000h 0x0000002f push edi 0x00000030 call 00007F36704F9B68h 0x00000035 pop edi 0x00000036 mov dword ptr [esp+04h], edi 0x0000003a add dword ptr [esp+04h], 0000001Bh 0x00000042 inc edi 0x00000043 push edi 0x00000044 ret 0x00000045 pop edi 0x00000046 ret 0x00000047 or si, 6E1Ah 0x0000004c push 00000003h 0x0000004e mov si, di 0x00000051 push 00000000h 0x00000053 movsx ecx, dx 0x00000056 push 00000003h 0x00000058 mov esi, 1E1EA36Bh 0x0000005d push A57F7412h 0x00000062 push eax 0x00000063 push edx 0x00000064 jmp 00007F36704F9B71h 0x00000069 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 677D38 second address: 677D77 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 jo 00007F367110D24Eh 0x0000000b push edx 0x0000000c pop edx 0x0000000d jp 00007F367110D246h 0x00000013 pushad 0x00000014 jmp 00007F367110D253h 0x00000019 jmp 00007F367110D24Ch 0x0000001e jg 00007F367110D246h 0x00000024 popad 0x00000025 popad 0x00000026 pushad 0x00000027 pushad 0x00000028 push eax 0x00000029 push edx 0x0000002a rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 677D77 second address: 677D8A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b push edi 0x0000000c pop edi 0x0000000d jnl 00007F36704F9B66h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 64AFC1 second address: 64AFD1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F367110D24Ch 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 64AFD1 second address: 64AFE2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F36704F9B6Bh 0x00000007 push eax 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 675B72 second address: 675B7B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6761D1 second address: 6761DB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6761DB second address: 6761E7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jo 00007F367110D246h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6761E7 second address: 6761FA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jno 00007F36704F9B68h 0x0000000d push eax 0x0000000e push eax 0x0000000f pop eax 0x00000010 pop eax 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6761FA second address: 67621D instructions: 0x00000000 rdtsc 0x00000002 jne 00007F367110D253h 0x00000008 jns 00007F367110D252h 0x0000000e jo 00007F367110D246h 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6764E5 second address: 6764F8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jns 00007F36704F9B66h 0x0000000c popad 0x0000000d push eax 0x0000000e push ebx 0x0000000f pop ebx 0x00000010 push ebx 0x00000011 pop ebx 0x00000012 pop eax 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6764F8 second address: 676514 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F367110D258h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 676514 second address: 676522 instructions: 0x00000000 rdtsc 0x00000002 jc 00007F36704F9B66h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 676522 second address: 676526 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 676526 second address: 67652A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 676686 second address: 67668D instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6767FF second address: 676803 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 676981 second address: 67698D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007F367110D246h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 67698D second address: 6769A7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007F36704F9B73h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 676B38 second address: 676B72 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F367110D246h 0x00000008 push esi 0x00000009 pop esi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jmp 00007F367110D251h 0x00000011 popad 0x00000012 push esi 0x00000013 push eax 0x00000014 push edx 0x00000015 push ecx 0x00000016 pop ecx 0x00000017 jmp 00007F367110D257h 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 676B72 second address: 676B96 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F36704F9B66h 0x00000008 je 00007F36704F9B66h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 pop eax 0x00000014 jmp 00007F36704F9B70h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 676E5D second address: 676E8B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F367110D24Ch 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c jmp 00007F367110D259h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6774A3 second address: 6774BA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jmp 00007F36704F9B6Fh 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6778D8 second address: 6778DC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6778DC second address: 6778E4 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 67E2B4 second address: 67E2BA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 67D1D1 second address: 67D1D5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 67E36A second address: 67E370 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 67F5E0 second address: 67F5E5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 64CABE second address: 64CACE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F367110D24Bh 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 64CACE second address: 64CADB instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F36704F9B68h 0x00000008 push ecx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6478FF second address: 647909 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push edi 0x00000007 pop edi 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 647909 second address: 647920 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 ja 00007F36704F9B66h 0x0000000d jmp 00007F36704F9B6Ah 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 647920 second address: 647945 instructions: 0x00000000 rdtsc 0x00000002 js 00007F367110D246h 0x00000008 jmp 00007F367110D253h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f jl 00007F367110D252h 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 68243D second address: 682443 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 682B2E second address: 682B34 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 682C7C second address: 682C86 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007F36704F9B66h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6848F6 second address: 6848FA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6848FA second address: 6848FE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6848FE second address: 684904 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 684CBC second address: 684CC2 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 685498 second address: 68549C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 68549C second address: 6854A0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 686E78 second address: 686E94 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F367110D258h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 686E94 second address: 686F0C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F36704F9B77h 0x00000007 push edi 0x00000008 pop edi 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop ecx 0x0000000c pushad 0x0000000d jnc 00007F36704F9B6Ah 0x00000013 jp 00007F36704F9B6Eh 0x00000019 pushad 0x0000001a jno 00007F36704F9B66h 0x00000020 jmp 00007F36704F9B77h 0x00000025 push esi 0x00000026 pop esi 0x00000027 jmp 00007F36704F9B75h 0x0000002c popad 0x0000002d pushad 0x0000002e push eax 0x0000002f pop eax 0x00000030 jl 00007F36704F9B66h 0x00000036 push eax 0x00000037 push edx 0x00000038 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 640ECD second address: 640EEF instructions: 0x00000000 rdtsc 0x00000002 js 00007F367110D248h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F367110D254h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 640EEF second address: 640EF6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 687F7F second address: 687F9E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F367110D24Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jno 00007F367110D24Ch 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6890A8 second address: 6890B2 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F36704F9B66h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6890B2 second address: 6890B8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6890B8 second address: 6890BC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6890BC second address: 689183 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jmp 00007F367110D256h 0x0000000e nop 0x0000000f push 00000000h 0x00000011 push edx 0x00000012 call 00007F367110D248h 0x00000017 pop edx 0x00000018 mov dword ptr [esp+04h], edx 0x0000001c add dword ptr [esp+04h], 0000001Bh 0x00000024 inc edx 0x00000025 push edx 0x00000026 ret 0x00000027 pop edx 0x00000028 ret 0x00000029 adc esi, 1B2A57E1h 0x0000002f jmp 00007F367110D254h 0x00000034 jns 00007F367110D24Ah 0x0000003a push 00000000h 0x0000003c push 00000000h 0x0000003e push ebx 0x0000003f call 00007F367110D248h 0x00000044 pop ebx 0x00000045 mov dword ptr [esp+04h], ebx 0x00000049 add dword ptr [esp+04h], 0000001Dh 0x00000051 inc ebx 0x00000052 push ebx 0x00000053 ret 0x00000054 pop ebx 0x00000055 ret 0x00000056 call 00007F367110D24Bh 0x0000005b je 00007F367110D24Ch 0x00000061 sub dword ptr [ebp+124483C0h], edx 0x00000067 pop edi 0x00000068 push 00000000h 0x0000006a jmp 00007F367110D24Bh 0x0000006f xchg eax, ebx 0x00000070 push eax 0x00000071 push edx 0x00000072 push eax 0x00000073 push edx 0x00000074 jmp 00007F367110D24Fh 0x00000079 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 689183 second address: 689187 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 689187 second address: 68918D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 68918D second address: 689193 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 68A6EF second address: 68A70F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F367110D252h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push ecx 0x0000000b push eax 0x0000000c push edx 0x0000000d jnp 00007F367110D246h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 689A43 second address: 689A47 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 68C2D1 second address: 68C2D6 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 68C2D6 second address: 68C2DC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6441F5 second address: 6441FB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6441FB second address: 6441FF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6441FF second address: 644207 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 644207 second address: 644211 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jne 00007F36704F9B66h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 644211 second address: 644215 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 644215 second address: 644225 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a jnp 00007F36704F9B66h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 644225 second address: 644234 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b push esi 0x0000000c pop esi 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 644234 second address: 644238 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 68D355 second address: 68D35B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 68D35B second address: 68D35F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 68DDF6 second address: 68DDFC instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 68DDFC second address: 68DE06 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jl 00007F36704F9B66h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 68DE06 second address: 68DE79 instructions: 0x00000000 rdtsc 0x00000002 js 00007F367110D246h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c nop 0x0000000d push 00000000h 0x0000000f push edi 0x00000010 call 00007F367110D248h 0x00000015 pop edi 0x00000016 mov dword ptr [esp+04h], edi 0x0000001a add dword ptr [esp+04h], 0000001Bh 0x00000022 inc edi 0x00000023 push edi 0x00000024 ret 0x00000025 pop edi 0x00000026 ret 0x00000027 or dword ptr [ebp+122D22AFh], ebx 0x0000002d push 00000000h 0x0000002f push 00000000h 0x00000031 push esi 0x00000032 call 00007F367110D248h 0x00000037 pop esi 0x00000038 mov dword ptr [esp+04h], esi 0x0000003c add dword ptr [esp+04h], 0000001Ah 0x00000044 inc esi 0x00000045 push esi 0x00000046 ret 0x00000047 pop esi 0x00000048 ret 0x00000049 add dword ptr [ebp+12448588h], edx 0x0000004f push 00000000h 0x00000051 mov esi, 712E9AF4h 0x00000056 push eax 0x00000057 jc 00007F367110D250h 0x0000005d pushad 0x0000005e pushad 0x0000005f popad 0x00000060 push eax 0x00000061 push edx 0x00000062 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 692CA1 second address: 692CA7 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6943AD second address: 6943B6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push esi 0x00000006 pop esi 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 695D99 second address: 695D9D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6993EB second address: 699476 instructions: 0x00000000 rdtsc 0x00000002 jg 00007F367110D24Ch 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dword ptr [esp], eax 0x0000000d call 00007F367110D256h 0x00000012 clc 0x00000013 pop edi 0x00000014 push 00000000h 0x00000016 push 00000000h 0x00000018 push edx 0x00000019 call 00007F367110D248h 0x0000001e pop edx 0x0000001f mov dword ptr [esp+04h], edx 0x00000023 add dword ptr [esp+04h], 00000015h 0x0000002b inc edx 0x0000002c push edx 0x0000002d ret 0x0000002e pop edx 0x0000002f ret 0x00000030 push 00000000h 0x00000032 push 00000000h 0x00000034 push ebx 0x00000035 call 00007F367110D248h 0x0000003a pop ebx 0x0000003b mov dword ptr [esp+04h], ebx 0x0000003f add dword ptr [esp+04h], 00000017h 0x00000047 inc ebx 0x00000048 push ebx 0x00000049 ret 0x0000004a pop ebx 0x0000004b ret 0x0000004c jno 00007F367110D246h 0x00000052 push eax 0x00000053 push eax 0x00000054 push edx 0x00000055 pushad 0x00000056 jmp 00007F367110D254h 0x0000005b push eax 0x0000005c push edx 0x0000005d rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 698489 second address: 69848F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 699476 second address: 69947B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 69857C second address: 698582 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 698582 second address: 698596 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jno 00007F367110D24Ch 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 69A56F second address: 69A589 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F36704F9B6Ch 0x00000008 jc 00007F36704F9B66h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 jl 00007F36704F9B70h 0x00000017 pushad 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 699658 second address: 699669 instructions: 0x00000000 rdtsc 0x00000002 jc 00007F367110D246h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b push eax 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 699669 second address: 69966D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 69C626 second address: 69C695 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F367110D256h 0x00000008 jmp 00007F367110D24Eh 0x0000000d popad 0x0000000e pop edx 0x0000000f pop eax 0x00000010 mov dword ptr [esp], eax 0x00000013 movsx ebx, di 0x00000016 mov dword ptr [ebp+124449D1h], ebx 0x0000001c push 00000000h 0x0000001e push 00000000h 0x00000020 push esi 0x00000021 call 00007F367110D248h 0x00000026 pop esi 0x00000027 mov dword ptr [esp+04h], esi 0x0000002b add dword ptr [esp+04h], 00000016h 0x00000033 inc esi 0x00000034 push esi 0x00000035 ret 0x00000036 pop esi 0x00000037 ret 0x00000038 push 00000000h 0x0000003a sub ebx, dword ptr [ebp+12448588h] 0x00000040 mov dword ptr [ebp+122D1E68h], ecx 0x00000046 push eax 0x00000047 ja 00007F367110D258h 0x0000004d push eax 0x0000004e push edx 0x0000004f push eax 0x00000050 push edx 0x00000051 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 69C695 second address: 69C699 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 69D5B0 second address: 69D5B4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 69D5B4 second address: 69D608 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop eax 0x00000007 mov dword ptr [esp], eax 0x0000000a sub dword ptr [ebp+122D1DC5h], ebx 0x00000010 push 00000000h 0x00000012 push 00000000h 0x00000014 push ecx 0x00000015 call 00007F36704F9B68h 0x0000001a pop ecx 0x0000001b mov dword ptr [esp+04h], ecx 0x0000001f add dword ptr [esp+04h], 0000001Ah 0x00000027 inc ecx 0x00000028 push ecx 0x00000029 ret 0x0000002a pop ecx 0x0000002b ret 0x0000002c xor bx, 8A6Eh 0x00000031 push 00000000h 0x00000033 pushad 0x00000034 jmp 00007F36704F9B72h 0x00000039 popad 0x0000003a xchg eax, esi 0x0000003b push ebx 0x0000003c pushad 0x0000003d push eax 0x0000003e push edx 0x0000003f rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 69D608 second address: 69D60E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 69B794 second address: 69B863 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 mov dword ptr [esp], eax 0x00000008 push 00000000h 0x0000000a push ebp 0x0000000b call 00007F36704F9B68h 0x00000010 pop ebp 0x00000011 mov dword ptr [esp+04h], ebp 0x00000015 add dword ptr [esp+04h], 0000001Ch 0x0000001d inc ebp 0x0000001e push ebp 0x0000001f ret 0x00000020 pop ebp 0x00000021 ret 0x00000022 jne 00007F36704F9B6Ch 0x00000028 mov edi, esi 0x0000002a mov dword ptr [ebp+122D1DC5h], ecx 0x00000030 push dword ptr fs:[00000000h] 0x00000037 call 00007F36704F9B77h 0x0000003c add ebx, dword ptr [ebp+122D3A8Eh] 0x00000042 pop ebx 0x00000043 sub dword ptr [ebp+122D2CD2h], edx 0x00000049 mov dword ptr fs:[00000000h], esp 0x00000050 jno 00007F36704F9B6Ch 0x00000056 mov eax, dword ptr [ebp+122D1569h] 0x0000005c push 00000000h 0x0000005e push edi 0x0000005f call 00007F36704F9B68h 0x00000064 pop edi 0x00000065 mov dword ptr [esp+04h], edi 0x00000069 add dword ptr [esp+04h], 00000018h 0x00000071 inc edi 0x00000072 push edi 0x00000073 ret 0x00000074 pop edi 0x00000075 ret 0x00000076 mov edi, dword ptr [ebp+1244A6E8h] 0x0000007c or dword ptr [ebp+122D2049h], esi 0x00000082 push FFFFFFFFh 0x00000084 jmp 00007F36704F9B76h 0x00000089 nop 0x0000008a pushad 0x0000008b pushad 0x0000008c pushad 0x0000008d popad 0x0000008e push eax 0x0000008f push edx 0x00000090 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 69E78B second address: 69E7A1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F367110D252h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 69F94D second address: 69F9B6 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F36704F9B6Ch 0x00000008 pop edx 0x00000009 pop eax 0x0000000a nop 0x0000000b clc 0x0000000c push 00000000h 0x0000000e push 00000000h 0x00000010 push ecx 0x00000011 call 00007F36704F9B68h 0x00000016 pop ecx 0x00000017 mov dword ptr [esp+04h], ecx 0x0000001b add dword ptr [esp+04h], 00000014h 0x00000023 inc ecx 0x00000024 push ecx 0x00000025 ret 0x00000026 pop ecx 0x00000027 ret 0x00000028 push edx 0x00000029 mov edi, 79668D73h 0x0000002e pop ebx 0x0000002f push 00000000h 0x00000031 push 00000000h 0x00000033 push ebx 0x00000034 call 00007F36704F9B68h 0x00000039 pop ebx 0x0000003a mov dword ptr [esp+04h], ebx 0x0000003e add dword ptr [esp+04h], 00000014h 0x00000046 inc ebx 0x00000047 push ebx 0x00000048 ret 0x00000049 pop ebx 0x0000004a ret 0x0000004b xchg eax, esi 0x0000004c pushad 0x0000004d push ecx 0x0000004e push ebx 0x0000004f pop ebx 0x00000050 pop ecx 0x00000051 push eax 0x00000052 push edx 0x00000053 jmp 00007F36704F9B6Ch 0x00000058 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 69F9B6 second address: 69F9D7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F367110D250h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b pushad 0x0000000c pushad 0x0000000d pushad 0x0000000e popad 0x0000000f pushad 0x00000010 popad 0x00000011 popad 0x00000012 push eax 0x00000013 push edx 0x00000014 push ebx 0x00000015 pop ebx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 69FB1A second address: 69FB1E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 69FBF4 second address: 69FBFA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 69E9FB second address: 69E9FF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 69E9FF second address: 69EA05 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6A2D3B second address: 6A2D4C instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F36704F9B66h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6A2D4C second address: 6A2D57 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007F367110D246h 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6A2D57 second address: 6A2D67 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F36704F9B6Ch 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6A3DFC second address: 6A3E06 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jne 00007F367110D246h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6A3E06 second address: 6A3E1C instructions: 0x00000000 rdtsc 0x00000002 jno 00007F36704F9B66h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 jp 00007F36704F9B66h 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6A4BE3 second address: 6A4BE8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6A5CFD second address: 6A5D01 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6A5D01 second address: 6A5D07 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6A5D07 second address: 6A5D0C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6A5D0C second address: 6A5D12 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6A85D4 second address: 6A85D9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6AD46B second address: 6AD471 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6AD013 second address: 6AD018 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6B332B second address: 6B3336 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop ebx 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6B3336 second address: 6B3340 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007F36704F9B66h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6B3340 second address: 6B3349 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6B5200 second address: 6B5204 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6B5204 second address: 6B5208 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6B5208 second address: 6B5212 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push edx 0x00000009 pop edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 649458 second address: 649463 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007F367110D246h 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 649463 second address: 64949B instructions: 0x00000000 rdtsc 0x00000002 jno 00007F36704F9B92h 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6B98B3 second address: 6B98B7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6B99FC second address: 6B9A00 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6B9A00 second address: 6B9A12 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 jg 00007F367110D246h 0x0000000f push edi 0x00000010 pop edi 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6B9A12 second address: 6B9A43 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jns 00007F36704F9B66h 0x00000009 pushad 0x0000000a popad 0x0000000b pushad 0x0000000c popad 0x0000000d popad 0x0000000e push edx 0x0000000f push eax 0x00000010 pop eax 0x00000011 pop edx 0x00000012 pop edx 0x00000013 pop eax 0x00000014 push edi 0x00000015 pushad 0x00000016 jmp 00007F36704F9B6Dh 0x0000001b jmp 00007F36704F9B6Ch 0x00000020 push eax 0x00000021 push edx 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6BD9BD second address: 6BD9D6 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 jmp 00007F367110D253h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6BD9D6 second address: 6BD9FB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F36704F9B73h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c jno 00007F36704F9B66h 0x00000012 push eax 0x00000013 pop eax 0x00000014 push esi 0x00000015 pop esi 0x00000016 popad 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 690775 second address: 69077A instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 690CFF second address: 690D09 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jo 00007F36704F9B66h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 690DDE second address: 690DE4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 691769 second address: 69176D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6917C6 second address: 6917CB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6917CB second address: 6917E4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 je 00007F36704F9B66h 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 push esi 0x00000011 pop esi 0x00000012 jc 00007F36704F9B66h 0x00000018 popad 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6BDE30 second address: 6BDE5F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F367110D257h 0x00000009 pop edx 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F367110D251h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6BE43A second address: 6BE440 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6BE440 second address: 6BE444 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6BE704 second address: 6BE709 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6BE709 second address: 6BE72F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F367110D255h 0x00000007 pushad 0x00000008 jbe 00007F367110D246h 0x0000000e jng 00007F367110D246h 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6BE72F second address: 6BE73B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6C7299 second address: 6C729D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6C6083 second address: 6C608C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop edi 0x00000005 pushad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6C608C second address: 6C60B1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007F367110D246h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push edx 0x0000000f push ebx 0x00000010 pushad 0x00000011 popad 0x00000012 pop ebx 0x00000013 jnc 00007F367110D252h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6C6670 second address: 6C6674 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6C67BC second address: 6C67C6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnc 00007F367110D246h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6C5DF2 second address: 6C5DF6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6C5DF6 second address: 6C5E0C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F367110D24Eh 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6C5E0C second address: 6C5E10 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6C5E10 second address: 6C5E3A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jbe 00007F367110D246h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d pushad 0x0000000e popad 0x0000000f jne 00007F367110D246h 0x00000015 jmp 00007F367110D24Eh 0x0000001a popad 0x0000001b popad 0x0000001c pushad 0x0000001d push eax 0x0000001e push edx 0x0000001f push eax 0x00000020 push edx 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6C5E3A second address: 6C5E3E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6C6A69 second address: 6C6A94 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jl 00007F367110D246h 0x0000000c popad 0x0000000d push ecx 0x0000000e jne 00007F367110D246h 0x00000014 pushad 0x00000015 popad 0x00000016 pop ecx 0x00000017 popad 0x00000018 ja 00007F367110D25Eh 0x0000001e jbe 00007F367110D24Ah 0x00000024 push esi 0x00000025 push eax 0x00000026 push edx 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6C6BD2 second address: 6C6BD8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6C6BD8 second address: 6C6BE8 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b pushad 0x0000000c push edi 0x0000000d pop edi 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6C6BE8 second address: 6C6C16 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 jmp 00007F36704F9B77h 0x0000000b jmp 00007F36704F9B6Ah 0x00000010 pushad 0x00000011 popad 0x00000012 popad 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6C6C16 second address: 6C6C1A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6C6C1A second address: 6C6C1E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6C6C1E second address: 6C6C24 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6427CE second address: 6427D4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6427D4 second address: 6427DB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6427DB second address: 642805 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F36704F9B71h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F36704F9B73h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 642805 second address: 64280A instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 64280A second address: 642828 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop esi 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F36704F9B6Fh 0x0000000e jl 00007F36704F9B66h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 642828 second address: 64282C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6CEF9A second address: 6CEFA0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6CEFA0 second address: 6CEFA6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6CEFA6 second address: 6CEFAA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6CEFAA second address: 6CEFB6 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push edi 0x0000000b pop edi 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6CF0F5 second address: 6CF0F9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6CF3F8 second address: 6CF3FE instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6CF3FE second address: 6CF404 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6CF404 second address: 6CF40E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jp 00007F367110D246h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6CF40E second address: 6CF42D instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push esi 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F36704F9B74h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6CF7E7 second address: 6CF7EB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6CFAD4 second address: 6CFADA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6CFADA second address: 6CFADE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6CE86E second address: 6CE892 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F36704F9B77h 0x00000008 pushad 0x00000009 popad 0x0000000a pushad 0x0000000b popad 0x0000000c popad 0x0000000d push eax 0x0000000e push eax 0x0000000f pop eax 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6CE892 second address: 6CE8E7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pop edx 0x00000006 pop eax 0x00000007 pushad 0x00000008 jg 00007F367110D263h 0x0000000e jg 00007F367110D246h 0x00000014 jmp 00007F367110D257h 0x00000019 pushad 0x0000001a jmp 00007F367110D255h 0x0000001f jmp 00007F367110D250h 0x00000024 popad 0x00000025 pushad 0x00000026 push eax 0x00000027 push edx 0x00000028 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6D43D2 second address: 6D43E4 instructions: 0x00000000 rdtsc 0x00000002 jno 00007F36704F9B66h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jno 00007F36704F9B66h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6D3F36 second address: 6D3F43 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jg 00007F367110D246h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6D3F43 second address: 6D3F4D instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F36704F9B66h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6D3F4D second address: 6D3F59 instructions: 0x00000000 rdtsc 0x00000002 jg 00007F367110D24Eh 0x00000008 push edi 0x00000009 pop edi 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6D7575 second address: 6D7582 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 jno 00007F36704F9B66h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6D6E22 second address: 6D6E26 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6D6E26 second address: 6D6E30 instructions: 0x00000000 rdtsc 0x00000002 jp 00007F36704F9B66h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6D6E30 second address: 6D6E3A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6D6FE1 second address: 6D7002 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F36704F9B78h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6D7002 second address: 6D7006 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6D7173 second address: 6D7177 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6D7177 second address: 6D717D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6DED1E second address: 6DED3A instructions: 0x00000000 rdtsc 0x00000002 jns 00007F36704F9B66h 0x00000008 jns 00007F36704F9B66h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 jnp 00007F36704F9B6Ch 0x00000016 je 00007F36704F9B66h 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6DED3A second address: 6DED73 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F367110D252h 0x00000007 jng 00007F367110D24Eh 0x0000000d jg 00007F367110D246h 0x00000013 push eax 0x00000014 pop eax 0x00000015 pop edx 0x00000016 pop eax 0x00000017 pushad 0x00000018 push esi 0x00000019 pushad 0x0000001a popad 0x0000001b pushad 0x0000001c popad 0x0000001d pop esi 0x0000001e pushad 0x0000001f jmp 00007F367110D24Bh 0x00000024 push eax 0x00000025 push edx 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6DD817 second address: 6DD821 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push eax 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6DD821 second address: 6DD837 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 popad 0x00000007 pop ebx 0x00000008 jne 00007F367110D268h 0x0000000e jc 00007F367110D24Eh 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6DDB02 second address: 6DDB25 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F36704F9B78h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push edi 0x0000000a pushad 0x0000000b popad 0x0000000c pop edi 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6DDC5B second address: 6DDC77 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 jp 00007F367110D253h 0x0000000b push eax 0x0000000c push edx 0x0000000d push edi 0x0000000e pop edi 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6DDDB3 second address: 6DDDC3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F36704F9B6Ch 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6DDDC3 second address: 6DDDCA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6E2391 second address: 6E2395 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6E2395 second address: 6E2399 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6E2399 second address: 6E23A1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6E2530 second address: 6E2554 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F367110D255h 0x00000007 je 00007F367110D246h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pushad 0x00000010 pushad 0x00000011 popad 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6E2554 second address: 6E258F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F36704F9B6Fh 0x00000009 jnl 00007F36704F9B66h 0x0000000f popad 0x00000010 pop eax 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 je 00007F36704F9B66h 0x0000001a jp 00007F36704F9B66h 0x00000020 jmp 00007F36704F9B70h 0x00000025 popad 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6E2870 second address: 6E287A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 je 00007F367110D246h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6E287A second address: 6E287E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6E287E second address: 6E288A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a push ecx 0x0000000b pop ecx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6E288A second address: 6E288E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6E2A33 second address: 6E2A4F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push esi 0x00000008 jmp 00007F367110D24Ch 0x0000000d jng 00007F367110D24Eh 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6E2BAA second address: 6E2BAE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6E585A second address: 6E585F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6E585F second address: 6E586D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 pushad 0x00000006 popad 0x00000007 popad 0x00000008 push eax 0x00000009 push edx 0x0000000a push edx 0x0000000b pop edx 0x0000000c push esi 0x0000000d pop esi 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6E5E22 second address: 6E5E28 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6E5E28 second address: 6E5E31 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 pushad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6EE6C3 second address: 6EE6C7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6EE6C7 second address: 6EE6D4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c pop eax 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6EE6D4 second address: 6EE6ED instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F367110D255h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6EE6ED second address: 6EE6FD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jc 00007F36704F9B6Ah 0x0000000c push ecx 0x0000000d pop ecx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6EC6B7 second address: 6EC6BD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6EC6BD second address: 6EC6EE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 popad 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a jmp 00007F36704F9B76h 0x0000000f pop edx 0x00000010 popad 0x00000011 push edx 0x00000012 push edx 0x00000013 jc 00007F36704F9B66h 0x00000019 pop edx 0x0000001a push eax 0x0000001b push edx 0x0000001c pushad 0x0000001d popad 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6EC6EE second address: 6EC6F2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6EC9A8 second address: 6EC9AD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6EC9AD second address: 6EC9B3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6ECC7C second address: 6ECC82 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6ECC82 second address: 6ECC90 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pushad 0x00000006 jne 00007F367110D24Ch 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6ECC90 second address: 6ECC97 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6ECC97 second address: 6ECC9D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6ECC9D second address: 6ECCBA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F36704F9B77h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6ECCBA second address: 6ECCC3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push edi 0x00000008 pop edi 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6ECF94 second address: 6ECF98 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6ECF98 second address: 6ECFA6 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jnp 00007F367110D246h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6ED285 second address: 6ED28B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6ED85D second address: 6ED865 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6ED865 second address: 6ED869 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6ED869 second address: 6ED86F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6EDB32 second address: 6EDB3D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push ecx 0x0000000a pop ecx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6EDE40 second address: 6EDE55 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F367110D251h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6EDE55 second address: 6EDE6F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F36704F9B6Ah 0x00000007 jl 00007F36704F9B66h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 push edx 0x00000012 pop edx 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6EDE6F second address: 6EDE73 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6EDE73 second address: 6EDE77 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6F1DA0 second address: 6F1DDC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F367110D253h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F367110D258h 0x00000011 jmp 00007F367110D24Ah 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6F1F23 second address: 6F1F38 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 jmp 00007F36704F9B6Ah 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c pushad 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6F1F38 second address: 6F1F3D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6F2310 second address: 6F2340 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F36704F9B77h 0x00000007 ja 00007F36704F9B66h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007F36704F9B6Bh 0x00000016 push eax 0x00000017 pop eax 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6F248D second address: 6F24A6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F367110D251h 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6F24A6 second address: 6F24B0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007F36704F9B66h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6F24B0 second address: 6F24CF instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 jnp 00007F367110D246h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F367110D24Bh 0x00000013 js 00007F367110D246h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6F7292 second address: 6F72AA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 jmp 00007F36704F9B72h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6F72AA second address: 6F72B4 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F367110D246h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 6F898C second address: 6F8990 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 70255F second address: 702565 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 702565 second address: 70256E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 700841 second address: 700845 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 700B4C second address: 700B50 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 700B50 second address: 700B55 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 700B55 second address: 700B6B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007F36704F9B6Dh 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 700B6B second address: 700B6F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 700CD9 second address: 700CDD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 700E09 second address: 700E0F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 700E0F second address: 700E13 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 700E13 second address: 700E19 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 7010F4 second address: 7010F8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 701C2D second address: 701C31 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 7023E1 second address: 7023E5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 704BAC second address: 704BB2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 704BB2 second address: 704BC0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F36704F9B6Ah 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 70ADB1 second address: 70ADCD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F367110D24Dh 0x00000009 pop ecx 0x0000000a push eax 0x0000000b push edx 0x0000000c jno 00007F367110D248h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 70ADCD second address: 70ADD8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 jng 00007F36704F9B66h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 717255 second address: 71725B instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 71D87E second address: 71D8AA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F36704F9B6Ch 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c push ebx 0x0000000d pop ebx 0x0000000e jmp 00007F36704F9B72h 0x00000013 popad 0x00000014 push eax 0x00000015 push edx 0x00000016 push ebx 0x00000017 pop ebx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 71D8AA second address: 71D8E2 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F367110D246h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007F367110D254h 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 je 00007F367110D246h 0x0000001a jmp 00007F367110D24Fh 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 71D8E2 second address: 71D902 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jmp 00007F36704F9B78h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 71D902 second address: 71D922 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F367110D24Ah 0x00000009 jmp 00007F367110D252h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 723028 second address: 723060 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F36704F9B75h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a jmp 00007F36704F9B6Ah 0x0000000f push eax 0x00000010 push edx 0x00000011 jnp 00007F36704F9B66h 0x00000017 jmp 00007F36704F9B6Ch 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 735C3B second address: 735C5C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F367110D252h 0x00000007 jmp 00007F367110D24Bh 0x0000000c pop edx 0x0000000d pop eax 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 735C5C second address: 735C64 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 735C64 second address: 735C68 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 734AD8 second address: 734AE8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F36704F9B6Ch 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 734AE8 second address: 734AEE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 734AEE second address: 734B13 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jc 00007F36704F9B7Bh 0x00000010 jmp 00007F36704F9B73h 0x00000015 pushad 0x00000016 popad 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 734B13 second address: 734B18 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 734B18 second address: 734B24 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007F36704F9B66h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 734C85 second address: 734C9A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jo 00007F367110D246h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d jnl 00007F367110D246h 0x00000013 pushad 0x00000014 popad 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 734C9A second address: 734C9E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 734C9E second address: 734CA4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 734F44 second address: 734F48 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 7396C7 second address: 7396FD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jbe 00007F367110D246h 0x0000000b ja 00007F367110D246h 0x00000011 popad 0x00000012 pop edx 0x00000013 pop eax 0x00000014 push eax 0x00000015 push edx 0x00000016 jng 00007F367110D25Ch 0x0000001c jmp 00007F367110D256h 0x00000021 push eax 0x00000022 push edx 0x00000023 push eax 0x00000024 push edx 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 7396FD second address: 739703 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 739703 second address: 739707 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 739707 second address: 73970D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 739204 second address: 739253 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F367110D255h 0x00000009 jmp 00007F367110D256h 0x0000000e jmp 00007F367110D258h 0x00000013 popad 0x00000014 pop eax 0x00000015 push eax 0x00000016 push edx 0x00000017 push eax 0x00000018 push edx 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 739253 second address: 739259 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 739259 second address: 73925D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 73925D second address: 739276 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F36704F9B73h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 73BAF7 second address: 73BB03 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F367110D24Eh 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 75409B second address: 75409F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 75409F second address: 7540A9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 756FA9 second address: 756FAF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 756FAF second address: 756FC4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jc 00007F367110D246h 0x0000000a jmp 00007F367110D24Bh 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 756FC4 second address: 756FC8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 756FC8 second address: 756FE7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F367110D256h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push edi 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 756BB5 second address: 756BC5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pushad 0x00000006 jnl 00007F36704F9B6Eh 0x0000000c pushad 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 756BC5 second address: 756BCE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pushad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 758712 second address: 758716 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 76D616 second address: 76D64F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F367110D251h 0x00000007 jmp 00007F367110D24Eh 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007F367110D24Ch 0x00000015 push ecx 0x00000016 jnc 00007F367110D246h 0x0000001c pop ecx 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 76D64F second address: 76D654 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 76DA55 second address: 76DA6A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007F367110D246h 0x0000000a popad 0x0000000b jl 00007F367110D24Ah 0x00000011 push eax 0x00000012 pop eax 0x00000013 pushad 0x00000014 popad 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 76DBF6 second address: 76DBFA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 76DBFA second address: 76DBFE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 76E06E second address: 76E090 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F36704F9B66h 0x00000008 jmp 00007F36704F9B74h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 76E090 second address: 76E094 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 76E094 second address: 76E0C4 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jmp 00007F36704F9B75h 0x0000000d popad 0x0000000e pushad 0x0000000f pushad 0x00000010 jnc 00007F36704F9B66h 0x00000016 pushad 0x00000017 popad 0x00000018 pushad 0x00000019 popad 0x0000001a popad 0x0000001b pushad 0x0000001c pushad 0x0000001d popad 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 770BD0 second address: 770BD4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 770EC9 second address: 770F3A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F36704F9B73h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], eax 0x0000000c jmp 00007F36704F9B74h 0x00000011 push 00000004h 0x00000013 jmp 00007F36704F9B76h 0x00000018 xor dword ptr [ebp+1247B26Bh], ebx 0x0000001e push 90BF4079h 0x00000023 pushad 0x00000024 pushad 0x00000025 jne 00007F36704F9B66h 0x0000002b jmp 00007F36704F9B73h 0x00000030 popad 0x00000031 push eax 0x00000032 push edx 0x00000033 push ecx 0x00000034 pop ecx 0x00000035 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 7711B2 second address: 7711B8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 7723C8 second address: 7723CE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 7740B0 second address: 7740B6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 7740B6 second address: 7740C5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jns 00007F36704F9B66h 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 7740C5 second address: 7740DA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jl 00007F367110D24Ah 0x00000011 push eax 0x00000012 pop eax 0x00000013 push ecx 0x00000014 pop ecx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 7740DA second address: 7740DF instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 775BB4 second address: 775BDF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F367110D24Ah 0x00000009 jmp 00007F367110D254h 0x0000000e popad 0x0000000f je 00007F367110D248h 0x00000015 pushad 0x00000016 popad 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 4A50235 second address: 4A50244 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F36704F9B6Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 4A50244 second address: 4A50270 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F367110D259h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F367110D24Ch 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 4A50270 second address: 4A502A3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F36704F9B6Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a jmp 00007F36704F9B76h 0x0000000f mov ebp, esp 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 mov edx, 5BA66BC0h 0x00000019 mov al, dl 0x0000001b popad 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 4A502A3 second address: 4A502B5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F367110D24Eh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 4A502B5 second address: 4A502CD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F36704F9B6Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop ebp 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 4A502CD second address: 4A502D1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 4A502D1 second address: 4A502D7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 4A502F9 second address: 4A502FF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 4A502FF second address: 4A5035A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov cx, 1657h 0x00000007 pushfd 0x00000008 jmp 00007F36704F9B6Ch 0x0000000d xor ah, FFFFFFC8h 0x00000010 jmp 00007F36704F9B6Bh 0x00000015 popfd 0x00000016 popad 0x00000017 pop edx 0x00000018 pop eax 0x00000019 xchg eax, ebp 0x0000001a jmp 00007F36704F9B76h 0x0000001f push eax 0x00000020 push eax 0x00000021 push edx 0x00000022 pushad 0x00000023 call 00007F36704F9B78h 0x00000028 pop eax 0x00000029 popad 0x0000002a rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 4A5035A second address: 4A50360 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 4A50360 second address: 4A50364 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 4A50364 second address: 4A503BF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ebp 0x00000009 pushad 0x0000000a call 00007F367110D254h 0x0000000f pushfd 0x00000010 jmp 00007F367110D252h 0x00000015 adc ecx, 74F70118h 0x0000001b jmp 00007F367110D24Bh 0x00000020 popfd 0x00000021 pop ecx 0x00000022 mov ax, bx 0x00000025 popad 0x00000026 mov ebp, esp 0x00000028 push eax 0x00000029 push edx 0x0000002a push eax 0x0000002b push edx 0x0000002c jmp 00007F367110D24Dh 0x00000031 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 4A503BF second address: 4A503C3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 4A503C3 second address: 4A503C9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 4A503C9 second address: 4A503CF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | RDTSC instruction interceptor: First address: 4A503CF second address: 4A503D3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_002AE330 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,CopyFileA,lstrcpy,lstrcpy,DeleteFileA,FindNextFileA,FindClose, | 0_2_002AE330 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_002915A0 lstrcpy,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrcpy,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,GetFileAttributesA,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrcpy,CopyFileA,lstrcpy,lstrcpy,DeleteFileA,FindNextFileA,FindClose, | 0_2_002915A0 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_002A15C0 lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,StrCmpCA,lstrcpy,lstrcpy,lstrcpy,StrCmpCA,lstrcpy,lstrcpy,lstrcpy,StrCmpCA,lstrcpy,lstrcpy,lstrcpy,StrCmpCA,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,FindNextFileA,FindClose, | 0_2_002A15C0 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_002AD640 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcpy,lstrcpy,FindNextFileA,FindClose, | 0_2_002AD640 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_002A2730 lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,StrCmpCA,lstrlen,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,GetFileAttributesA,StrCmpCA,lstrlen,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,GetFileAttributesA,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,GetFileAttributesA,lstrcpy,lstrcpy,lstrcpy,lstrcpy,FindNextFileA, | 0_2_002A2730 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_002A1C40 lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcpy,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,CopyFileA,lstrcpy,lstrcpy,DeleteFileA,FindNextFileA,FindClose, | 0_2_002A1C40 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_002ACCE0 wsprintfA,FindFirstFileA,lstrcat,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcat,lstrlen,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,CreateFileA,GetFileSizeEx,CloseHandle,CloseHandle,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,lstrcpy,lstrcpy,DeleteFileA,FindNextFileA,FindClose, | 0_2_002ACCE0 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_002A3CC0 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,DeleteFileA,CopyFileA,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,FindNextFileA,FindClose, | 0_2_002A3CC0 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_0029DD70 lstrcpy,lstrcpy,lstrcpy,lstrcpy,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlen,lstrcpy,lstrcpy,lstrcpy,lstrcpy,StrCmpCA,StrCmpCA,lstrcpy,lstrcpy,CopyFileA,lstrcpy,lstrcpy,lstrcpy,lstrcpy,DeleteFileA,StrCmpCA,lstrcpy,lstrcpy,lstrcpy,StrCmpCA,StrCmpCA,lstrcpy,StrCmpCA,lstrcpy,CopyFileA,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,StrCmpCA,DeleteFileA,StrCmpCA,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,FindNextFileA,FindClose, | 0_2_0029DD70 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_002ADE50 GetProcessHeap,RtlAllocateHeap,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcat,lstrcat,lstrlen,lstrlen,lstrcpy, | 0_2_002ADE50 |
Source: C:\Users\user\Desktop\random(6).exe | Code function: 0_2_002A4EC0 lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,StrCmpCA,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,CopyFileA,lstrcpy,CopyFileA,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,DeleteFileA,lstrcpy,lstrcpy,lstrcpy,FindNextFileA,FindClose, | 0_2_002A4EC0 |