Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0040385D | 0_2_0040385D |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0040307F | 0_2_0040307F |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0041D080 | 0_2_0041D080 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0043F16B | 0_2_0043F16B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0041A920 | 0_2_0041A920 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0041B980 | 0_2_0041B980 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0041B270 | 0_2_0041B270 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0041CB00 | 0_2_0041CB00 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0040E490 | 0_2_0040E490 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0041A4B0 | 0_2_0041A4B0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00417D69 | 0_2_00417D69 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0041ADD0 | 0_2_0041ADD0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0043FDA4 | 0_2_0043FDA4 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_004175AF | 0_2_004175AF |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0041765B | 0_2_0041765B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0041B6F0 | 0_2_0041B6F0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00419FC0 | 0_2_00419FC0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_10015030 | 0_2_10015030 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_10011030 | 0_2_10011030 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_100128D0 | 0_2_100128D0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_10013930 | 0_2_10013930 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_10013220 | 0_2_10013220 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_1000FA6E | 0_2_1000FA6E |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_10014AB0 | 0_2_10014AB0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_1000F360 | 0_2_1000F360 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_10006440 | 0_2_10006440 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_10012460 | 0_2_10012460 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_1000FD19 | 0_2_1000FD19 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_10012D80 | 0_2_10012D80 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_100136A0 | 0_2_100136A0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_10011F70 | 0_2_10011F70 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_023140AC | 0_2_023140AC |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_023194F0 | 0_2_023194F0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02301817 | 0_2_02301817 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0231581F | 0_2_0231581F |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_022FE878 | 0_2_022FE878 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02318E51 | 0_2_02318E51 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02327DC3 | 0_2_02327DC3 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024DC30D | 0_2_024DC30D |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024D13ED | 0_2_024D13ED |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024CDBE2 | 0_2_024CDBE2 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024ED22D | 0_2_024ED22D |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0258C236 | 0_2_0258C236 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0258D223 | 0_2_0258D223 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024E72CD | 0_2_024E72CD |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_025472DF | 0_2_025472DF |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0254329D | 0_2_0254329D |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02584284 | 0_2_02584284 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024CE2AD | 0_2_024CE2AD |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0250B2A6 | 0_2_0250B2A6 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0256E362 | 0_2_0256E362 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0256A3CC | 0_2_0256A3CC |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024BE39F | 0_2_024BE39F |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024D004D | 0_2_024D004D |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02598053 | 0_2_02598053 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024D303D | 0_2_024D303D |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_025850F3 | 0_2_025850F3 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0258D0F6 | 0_2_0258D0F6 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0256B159 | 0_2_0256B159 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0257B173 | 0_2_0257B173 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02541119 | 0_2_02541119 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_025881ED | 0_2_025881ED |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_0040385D | 2_2_0040385D |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_0040307F | 2_2_0040307F |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_0041D080 | 2_2_0041D080 |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_0043F16B | 2_2_0043F16B |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_0041A920 | 2_2_0041A920 |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_0041B980 | 2_2_0041B980 |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_0041B270 | 2_2_0041B270 |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_0041CB00 | 2_2_0041CB00 |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_0040E490 | 2_2_0040E490 |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_0041A4B0 | 2_2_0041A4B0 |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_00417D69 | 2_2_00417D69 |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_0041ADD0 | 2_2_0041ADD0 |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_0043FDA4 | 2_2_0043FDA4 |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_004175AF | 2_2_004175AF |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_0041765B | 2_2_0041765B |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_0041B6F0 | 2_2_0041B6F0 |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_00419FC0 | 2_2_00419FC0 |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_10015030 | 2_2_10015030 |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_10011030 | 2_2_10011030 |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_100128D0 | 2_2_100128D0 |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_10013930 | 2_2_10013930 |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_10013220 | 2_2_10013220 |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_1000FA6E | 2_2_1000FA6E |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_10014AB0 | 2_2_10014AB0 |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_1000F360 | 2_2_1000F360 |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_10006440 | 2_2_10006440 |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_10012460 | 2_2_10012460 |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_1000FD19 | 2_2_1000FD19 |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_10012D80 | 2_2_10012D80 |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_100136A0 | 2_2_100136A0 |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_10011F70 | 2_2_10011F70 |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_00F960E0 | 2_2_00F960E0 |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_00FAD087 | 2_2_00FAD087 |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_00F9907F | 2_2_00F9907F |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_00FB06B9 | 2_2_00FB06B9 |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_00FBF62B | 2_2_00FBF62B |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_00FAB914 | 2_2_00FAB914 |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_00FB0D58 | 2_2_00FB0D58 |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_0114E142 | 2_2_0114E142 |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_0115F505 | 2_2_0115F505 |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_01162D10 | 2_2_01162D10 |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_0116DC30 | 2_2_0116DC30 |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_0122A13B | 2_2_0122A13B |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_0119413C | 2_2_0119413C |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_011E7128 | 2_2_011E7128 |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_01213172 | 2_2_01213172 |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_0121F17A | 2_2_0121F17A |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_0122117E | 2_2_0122117E |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_0121719C | 2_2_0121719C |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_0121E0B0 | 2_2_0121E0B0 |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_012160B9 | 2_2_012160B9 |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_0120E09C | 2_2_0120E09C |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_011F90E8 | 2_2_011F90E8 |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_0121F3B6 | 2_2_0121F3B6 |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_012033F0 | 2_2_012033F0 |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_0117A290 | 2_2_0117A290 |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_012002BD | 2_2_012002BD |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_0117C2C0 | 2_2_0117C2C0 |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_012102FD | 2_2_012102FD |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_0121F561 | 2_2_0121F561 |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_01216541 | 2_2_01216541 |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_011FC580 | 2_2_011FC580 |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_01228593 | 2_2_01228593 |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_0121E40F | 2_2_0121E40F |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_0120D4C6 | 2_2_0120D4C6 |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_0115B790 | 2_2_0115B790 |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_0121E780 | 2_2_0121E780 |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_011CC7D0 | 2_2_011CC7D0 |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_011A4600 | 2_2_011A4600 |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_0121069C | 2_2_0121069C |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_0117A920 | 2_2_0117A920 |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_01229976 | 2_2_01229976 |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_01161970 | 2_2_01161970 |
Source: C:\ProgramData\javaw.exe | Code function: 2_2_01164960 | 2_2_01164960 |
Source: C:\Users\user\Desktop\file.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: mfc42.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: msvcp60.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: edputil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: windows.staterepositoryps.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: appresolver.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: bcp47langs.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: slc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: onecorecommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: onecoreuapcommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: pcacli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: sfc_os.dll | Jump to behavior |
Source: C:\ProgramData\javaw.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\ProgramData\javaw.exe | Section loaded: mfc42.dll | Jump to behavior |
Source: C:\ProgramData\javaw.exe | Section loaded: msvcp60.dll | Jump to behavior |
Source: C:\ProgramData\javaw.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\ProgramData\javaw.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\ProgramData\javaw.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\ProgramData\javaw.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\ProgramData\javaw.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\ProgramData\javaw.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\ProgramData\javaw.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\ProgramData\javaw.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\ProgramData\javaw.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\ProgramData\javaw.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\ProgramData\javaw.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\ProgramData\javaw.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\ProgramData\javaw.exe | Section loaded: mfc42.dll | Jump to behavior |
Source: C:\ProgramData\javaw.exe | Section loaded: msvcp60.dll | Jump to behavior |
Source: C:\ProgramData\javaw.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\ProgramData\javaw.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\ProgramData\javaw.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\ProgramData\javaw.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\ProgramData\javaw.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\ProgramData\javaw.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\ProgramData\javaw.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\ProgramData\javaw.exe | Section loaded: napinsp.dll | Jump to behavior |
Source: C:\ProgramData\javaw.exe | Section loaded: pnrpnsp.dll | Jump to behavior |
Source: C:\ProgramData\javaw.exe | Section loaded: wshbth.dll | Jump to behavior |
Source: C:\ProgramData\javaw.exe | Section loaded: nlaapi.dll | Jump to behavior |
Source: C:\ProgramData\javaw.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\ProgramData\javaw.exe | Section loaded: winrnr.dll | Jump to behavior |
Source: C:\ProgramData\javaw.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\ProgramData\javaw.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\ProgramData\javaw.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\ProgramData\javaw.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\ProgramData\javaw.exe | Section loaded: devenum.dll | Jump to behavior |
Source: C:\ProgramData\javaw.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\ProgramData\javaw.exe | Section loaded: devobj.dll | Jump to behavior |
Source: C:\ProgramData\javaw.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\ProgramData\javaw.exe | Section loaded: msdmo.dll | Jump to behavior |
Source: C:\ProgramData\javaw.exe | Section loaded: avicap32.dll | Jump to behavior |
Source: C:\ProgramData\javaw.exe | Section loaded: msvfw32.dll | Jump to behavior |
Source: C:\ProgramData\javaw.exe | Section loaded: avicap32.dll | Jump to behavior |
Source: C:\ProgramData\javaw.exe | Section loaded: msvfw32.dll | Jump to behavior |
Source: C:\ProgramData\javaw.exe | Section loaded: avicap32.dll | Jump to behavior |
Source: C:\ProgramData\javaw.exe | Section loaded: msvfw32.dll | Jump to behavior |
Source: C:\ProgramData\javaw.exe | Section loaded: avicap32.dll | Jump to behavior |
Source: C:\ProgramData\javaw.exe | Section loaded: msvfw32.dll | Jump to behavior |
Source: C:\ProgramData\javaw.exe | Section loaded: avicap32.dll | Jump to behavior |
Source: C:\ProgramData\javaw.exe | Section loaded: msvfw32.dll | Jump to behavior |
Source: C:\ProgramData\javaw.exe | Section loaded: avicap32.dll | Jump to behavior |
Source: C:\ProgramData\javaw.exe | Section loaded: msvfw32.dll | Jump to behavior |
Source: C:\ProgramData\javaw.exe | Section loaded: avicap32.dll | Jump to behavior |
Source: C:\ProgramData\javaw.exe | Section loaded: msvfw32.dll | Jump to behavior |
Source: C:\ProgramData\javaw.exe | Section loaded: avicap32.dll | Jump to behavior |
Source: C:\ProgramData\javaw.exe | Section loaded: msvfw32.dll | Jump to behavior |
Source: C:\ProgramData\javaw.exe | Section loaded: avicap32.dll | Jump to behavior |
Source: C:\ProgramData\javaw.exe | Section loaded: msvfw32.dll | Jump to behavior |
Source: C:\ProgramData\javaw.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\ProgramData\javaw.exe | Section loaded: mfc42.dll | Jump to behavior |
Source: C:\ProgramData\javaw.exe | Section loaded: msvcp60.dll | Jump to behavior |
Source: C:\ProgramData\javaw.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\ProgramData\javaw.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\ProgramData\javaw.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\ProgramData\javaw.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\ProgramData\javaw.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\ProgramData\javaw.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wersvc.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: windowsperformancerecordercontrol.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: weretw.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: xmllite.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wer.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: policymanager.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: msvcp110_win.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: policymanager.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: msvcp110_win.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: policymanager.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: msvcp110_win.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: policymanager.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: msvcp110_win.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: policymanager.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: msvcp110_win.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: policymanager.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: msvcp110_win.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: faultrep.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: dbghelp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: dbgcore.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wer.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: policymanager.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: msvcp110_win.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: policymanager.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: msvcp110_win.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: policymanager.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: msvcp110_win.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: policymanager.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: msvcp110_win.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: policymanager.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: msvcp110_win.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: policymanager.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: msvcp110_win.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: policymanager.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: msvcp110_win.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: policymanager.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: msvcp110_win.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: policymanager.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: msvcp110_win.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: policymanager.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: msvcp110_win.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: policymanager.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: msvcp110_win.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: policymanager.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: msvcp110_win.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4FAE3F second address: 4FAE0D instructions: 0x00000000 rdtsc 0x00000002 mov cl, E4h 0x00000004 mov cl, ah 0x00000006 jmp 00007FBD04BA4796h 0x00000008 bswap eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4FAE0D second address: 4FAE47 instructions: 0x00000000 rdtsc 0x00000002 mov edx, dword ptr [esp] 0x00000005 mov edi, edx 0x00000007 mov cx, D400h 0x0000000b lea ebp, dword ptr [esp+edx] 0x0000000e jmp 00007FBD04820EEAh 0x00000010 mov ebx, edx 0x00000012 lea esi, dword ptr [00000000h+ebp*4] 0x00000019 xchg cx, bp 0x0000001c mov bl, byte ptr [esp] 0x0000001f jmp 00007FBD04820F29h 0x00000021 mov edi, dword ptr [esp] 0x00000024 mov ecx, C7CA738Bh 0x00000029 mov ah, F9h 0x0000002b mov bp, word ptr [esp] 0x0000002f xchg cl, al 0x00000031 xchg ecx, edx 0x00000033 jmp 00007FBD04820F98h 0x00000038 xchg bx, cx 0x0000003b lea edx, dword ptr [B38AD51Bh] 0x00000041 mov esi, EE51B137h 0x00000046 mov ecx, dword ptr [esp] 0x00000049 lea eax, dword ptr [esp+ebp] 0x0000004c mov dh, bl 0x0000004e jmp 00007FBD04820EB6h 0x00000050 mov ecx, dword ptr [esp] 0x00000053 mov dh, byte ptr [esp] 0x00000056 xchg di, dx 0x00000059 not bl 0x0000005b xchg edx, ebp 0x0000005d lea ebx, dword ptr [eax+ebp] 0x00000060 jmp 00007FBD04820ED4h 0x00000062 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4FAE47 second address: 4FAE49 instructions: 0x00000000 rdtsc 0x00000002 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 44F5A7 second address: 44F43C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBD04820E93h 0x00000004 xchg ax, bx 0x00000006 call 00007FBD04820EB2h 0x0000000b mov dh, cl 0x0000000d sub esp, 14h 0x00000010 mov edx, dword ptr [esp+0Fh] 0x00000014 xchg dword ptr [esp+05h], edx 0x00000018 jmp 00007FBD04820E8Fh 0x0000001d xchg dword ptr [esp+14h], edx 0x00000021 shl ebx, 06h 0x00000024 mov ax, si 0x00000027 mov ebx, 17CE373Dh 0x0000002c sub esp, 05h 0x0000002f call 00007FBD04820EB6h 0x00000034 lea esp, dword ptr [esp+01h] 0x00000038 jmp 00007FBD04820EF6h 0x0000003a lea edx, dword ptr [edx+000000D3h] 0x00000040 stc 0x00000041 mov eax, edi 0x00000043 mov al, C7h 0x00000045 bswap ebx 0x00000047 jmp 00007FBD04820F35h 0x00000049 mov eax, 02C65B77h 0x0000004e xchg dword ptr [esp+1Ch], edx 0x00000052 xchg bx, dx 0x00000055 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 44F43C second address: 44F5C1 instructions: 0x00000000 rdtsc 0x00000002 lea ebx, dword ptr [esp+0Bh] 0x00000006 push dword ptr [esp+1Ch] 0x0000000a retn 0020h 0x0000000d mov dx, word ptr [esp] 0x00000011 jmp 00007FBD04BA45E0h 0x00000016 mov edx, 8724C233h 0x0000001b sub esp, 1Ah 0x0000001e jno 00007FBD04BA4837h 0x00000020 mov edx, ecx 0x00000022 mov dx, word ptr [esp] 0x00000026 lea esp, dword ptr [esp+02h] 0x0000002a lea esp, dword ptr [esp+18h] 0x0000002e neg ebp 0x00000030 mov bx, ax 0x00000033 mov dh, 56h 0x00000035 jmp 00007FBD04BA487Bh 0x0000003a sub esp, 10h 0x0000003d jnc 00007FBD04BA47B7h 0x0000003f bswap edx 0x00000041 lea esp, dword ptr [esp+07h] 0x00000045 jmp 00007FBD04BA4807h 0x00000047 pop eax 0x00000048 call 00007FBD04BA47E5h 0x0000004d lea esp, dword ptr [esp+01h] 0x00000051 lea esp, dword ptr [esp+08h] 0x00000055 xor ebp, 19DD69F3h 0x0000005b jmp 00007FBD04BA4793h 0x0000005d neg ax 0x00000060 jl 00007FBD04BA4837h 0x00000062 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 44F5C1 second address: 44F6CE instructions: 0x00000000 rdtsc 0x00000002 mov ebx, 4A18971Dh 0x00000007 jmp 00007FBD04820EF3h 0x00000009 xchg bx, ax 0x0000000c xor ah, ah 0x0000000e shr dh, 00000006h 0x00000011 jmp 00007FBD04820F27h 0x00000013 ror ebp, 00000000h 0x00000016 mov bx, 258Eh 0x0000001a or ebx, ebx 0x0000001c jc 00007FBD04821026h 0x00000022 jnc 00007FBD04820F9Bh 0x00000028 not bx 0x0000002b lea ebx, dword ptr [00000000h+esi*4] 0x00000032 inc bl 0x00000034 jmp 00007FBD04820F95h 0x00000039 jmp 00007FBD04820E40h 0x0000003e xor ebp, 4F446086h 0x00000044 shr ebx, cl 0x00000046 jbe 00007FBD04820EF2h 0x00000048 mov dl, byte ptr [esp] 0x0000004b jmp 00007FBD04820F16h 0x0000004d bswap eax 0x0000004f mov bh, byte ptr [esp] 0x00000052 mov bx, bp 0x00000055 jmp 00007FBD04820F16h 0x00000057 bts ebx, edi 0x0000005a call 00007FBD04820F52h 0x0000005f sub esp, 0Dh 0x00000062 not ebx 0x00000064 mov bx, word ptr [esp+08h] 0x00000069 lea esp, dword ptr [esp+01h] 0x0000006d xchg dword ptr [esp+0Ch], ebp 0x00000071 jmp 00007FBD04820EE8h 0x00000073 lea eax, dword ptr [00000000h+ecx*4] 0x0000007a setnl ah 0x0000007d call 00007FBD04820F30h 0x00000082 call 00007FBD04820F3Ch 0x00000087 lea ebp, dword ptr [ebp+67h] 0x0000008a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 44F6CE second address: 44F8A9 instructions: 0x00000000 rdtsc 0x00000002 not dh 0x00000004 lea ebx, dword ptr [ecx+esi] 0x00000007 jmp 00007FBD04BA49A0h 0x0000000c xchg dword ptr [esp+14h], ebp 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 45D953 second address: 45D994 instructions: 0x00000000 rdtsc 0x00000002 stc 0x00000003 call 00007FBD04820F4Eh 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 468C67 second address: 468C53 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBD04BA47B2h 0x00000004 setl dl 0x00000007 push bx 0x00000009 xchg byte ptr [esp], ah 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 46227E second address: 4622CE instructions: 0x00000000 rdtsc 0x00000002 call 00007FBD04820EEBh 0x00000007 mov bl, 14h 0x00000009 stc 0x0000000a mov dh, bh 0x0000000c mov ax, word ptr [esp] 0x00000010 xchg dword ptr [esp], edx 0x00000013 jmp 00007FBD04820F45h 0x00000015 mov bh, byte ptr [esp] 0x00000018 mov bx, 3147h 0x0000001c mov ebx, DE4C7237h 0x00000021 mov ebx, dword ptr [esp] 0x00000024 lea edx, dword ptr [edx-0000004Dh] 0x0000002a bsr eax, esp 0x0000002d jmp 00007FBD04820EE2h 0x0000002f setne ah 0x00000032 inc bx 0x00000034 xchg dword ptr [esp], edx 0x00000037 bt edx, edi 0x0000003a mov dl, byte ptr [esp] 0x0000003d xchg al, ah 0x0000003f jmp 00007FBD04820F5Eh 0x00000041 mov ah, DEh 0x00000043 push dword ptr [esp] 0x00000046 retn 0004h 0x00000049 push ecx 0x0000004a shl al, cl 0x0000004c jno 00007FBD04820FA3h 0x00000052 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 45DCF2 second address: 45DD44 instructions: 0x00000000 rdtsc 0x00000002 xchg ax, dx 0x00000004 push esi 0x00000005 shr si, cl 0x00000008 jne 00007FBD04BA47B1h 0x0000000a jmp 00007FBD04BA4811h 0x0000000c neg dh 0x0000000e sub esp, 09h 0x00000011 mov word ptr [esp], bp 0x00000015 call 00007FBD04BA47ECh 0x0000001a not bx 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 45DD44 second address: 45DFA9 instructions: 0x00000000 rdtsc 0x00000002 mov si, ax 0x00000005 mov ax, sp 0x00000008 xchg dword ptr [esp], ebx 0x0000000b jmp 00007FBD04820EECh 0x0000000d lea edx, dword ptr [eax+ebx] 0x00000010 mov dl, BAh 0x00000012 btc dx, bx 0x00000016 lea ebx, dword ptr [ebx+5Bh] 0x00000019 jmp 00007FBD04820F40h 0x0000001b mov si, F9BFh 0x0000001f lea esi, dword ptr [edi+72703053h] 0x00000025 mov dl, F5h 0x00000027 bsf ax, bx 0x0000002b xchg dword ptr [esp], ebx 0x0000002e mov al, ah 0x00000030 jmp 00007FBD04820EE5h 0x00000032 pushfd 0x00000033 mov eax, dword ptr [esp] 0x00000036 sub esp, 12h 0x00000039 lea esp, dword ptr [esp+02h] 0x0000003d push dword ptr [esp+14h] 0x00000041 retn 0018h 0x00000044 lea esp, dword ptr [esp+01h] 0x00000048 jmp 00007FBD04820F22h 0x0000004a bsr ebx, edx 0x0000004d jnp 00007FBD0482110Eh 0x00000053 mov eax, 7A7AB50Dh 0x00000058 lea edx, dword ptr [00000000h+ebp*4] 0x0000005f push ecx 0x00000060 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4626B2 second address: 4626B4 instructions: 0x00000000 rdtsc 0x00000002 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4614E1 second address: 44F5A7 instructions: 0x00000000 rdtsc 0x00000002 lea ebx, dword ptr [ebx-000028E1h] 0x00000008 clc 0x00000009 jne 00007FBD04820EF1h 0x0000000b pop edi 0x0000000c jmp 00007FBD04820F32h 0x0000000e mov al, dl 0x00000010 sub esp, 17h 0x00000013 jmp 00007FBD04821002h 0x00000018 jp 00007FBD04820E24h 0x0000001e mov dx, 612Dh 0x00000022 xchg ah, bh 0x00000024 jmp 00007FBD04820E78h 0x00000029 lea esp, dword ptr [esp+03h] 0x0000002d jmp 00007FBD04820EE6h 0x0000002f add esp, 1Ch 0x00000032 jno 00007FBD04820EF7h 0x00000034 pop ebp 0x00000035 inc bh 0x00000037 jmp 00007FBD04820F7Eh 0x00000039 jne 00007FBD04820EBCh 0x0000003b shr al, 00000005h 0x0000003e bts edx, edx 0x00000041 jmp 00007FBD04820F45h 0x00000043 pop esi 0x00000044 jmp 00007FBD0480ED6Ah 0x00000049 mov ecx, ebp 0x0000004b bt ebx, edi 0x0000004e je 00007FBD04821135h 0x00000054 pushad 0x00000055 jmp 00007FBD048210D4h 0x0000005a add esp, 0Ah 0x0000005d lea esp, dword ptr [esp+02h] 0x00000061 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4643D2 second address: 464417 instructions: 0x00000000 rdtsc 0x00000002 mov dh, bl 0x00000004 mov dx, 8786h 0x00000008 shr eax, 00000000h 0x0000000b xchg dx, ax 0x0000000e jmp 00007FBD04BA47ACh 0x00000010 xchg dword ptr [esp], ebp 0x00000013 cmc 0x00000014 bsr dx, sp 0x00000018 not ah 0x0000001a bswap eax 0x0000001c bswap eax 0x0000001e jmp 00007FBD04BA4A4Ah 0x00000023 lea ebp, dword ptr [ebp-00000021h] 0x00000029 bswap edx 0x0000002b sete al 0x0000002e stc 0x0000002f mov dx, word ptr [esp] 0x00000033 xchg dword ptr [esp], ebp 0x00000036 jmp 00007FBD04BA467Eh 0x0000003b sbb eax, edx 0x0000003d mov edx, 2D87C49Bh 0x00000042 neg ax 0x00000045 bsf eax, ebp 0x00000048 sbb eax, 377E77FDh 0x0000004d push dword ptr [esp] 0x00000050 retn 0004h 0x00000053 mov al, ah 0x00000055 jmp 00007FBD04BA485Ch 0x0000005a mov dx, 1D8Dh 0x0000005e xchg dx, ax 0x00000061 xor dl, 00000062h 0x00000064 jnbe 00007FBD04BA47AAh 0x00000066 xchg ah, dh 0x00000068 jmp 00007FBD04BA47B8h 0x0000006a bsr dx, bx 0x0000006e lea eax, dword ptr [esp-3Bh] 0x00000072 mov ah, byte ptr [esp] 0x00000075 jmp 00007FBD04BA47DFh 0x00000077 lea edx, dword ptr [00000000h+esi*4] 0x0000007e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 464417 second address: 4644C0 instructions: 0x00000000 rdtsc 0x00000002 rcr ah, 00000007h 0x00000005 jg 00007FBD04820FB4h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 464765 second address: 4647BF instructions: 0x00000000 rdtsc 0x00000002 mov ax, 49FAh 0x00000006 mov dh, bh 0x00000008 jmp 00007FBD04BA47FBh 0x0000000a mov al, 24h 0x0000000c xchg dx, ax 0x0000000f lea eax, dword ptr [esi-43A12DA5h] 0x00000015 rol bl, 00000000h 0x00000018 bsf ax, bx 0x0000001c jmp 00007FBD04BA47FBh 0x0000001e jnp 00007FBD04BA477Dh 0x00000020 stc 0x00000021 sub esp, 1Eh 0x00000024 jmp 00007FBD04BA47B4h 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 468CEE second address: 468C53 instructions: 0x00000000 rdtsc 0x00000002 setl dl 0x00000005 push bx 0x00000007 jmp 00007FBD04820E6Bh 0x0000000c xchg byte ptr [esp], ah 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 46421C second address: 451FCF instructions: 0x00000000 rdtsc 0x00000002 rcl bl, 00000004h 0x00000005 jns 00007FBD04BA48D2h 0x0000000b shl ebx, cl 0x0000000d jmp 00007FBD04BA48B3h 0x00000012 neg bx 0x00000015 dec ax 0x00000017 jmp 00007FBD04BA47E9h 0x00000019 call 00007FBD04BA4896h 0x0000001e neg al 0x00000020 jp 00007FBD04BA4776h 0x00000022 jmp 00007FBD04BA47A3h 0x00000024 add esp, 04h 0x00000027 jnle 00007FBD04BA47A7h 0x00000029 pop ecx 0x0000002a jmp 00007FBD04B92453h 0x0000002f mov ecx, edi 0x00000031 xchg al, bl 0x00000033 xchg ah, dh 0x00000035 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4624DF second address: 4623B0 instructions: 0x00000000 rdtsc 0x00000002 setl bh 0x00000005 xor eax, eax 0x00000007 btr edx, ebx 0x0000000a jmp 00007FBD04820E0Bh 0x0000000f xchg dword ptr [esp], ebp 0x00000012 xchg dx, bx 0x00000015 sub bh, bl 0x00000017 clc 0x00000018 mov bh, 48h 0x0000001a xchg ebx, edx 0x0000001c jmp 00007FBD04820ED9h 0x0000001e lea ebp, dword ptr [ebp+00000197h] 0x00000024 bsf eax, edi 0x00000027 sub esp, 11h 0x0000002a and edx, ebp 0x0000002c xchg byte ptr [esp+0Ch], dl 0x00000030 sub esp, 0Eh 0x00000033 jmp 00007FBD04820EE5h 0x00000035 lea esp, dword ptr [esp+03h] 0x00000039 xchg dword ptr [esp+1Ch], ebp 0x0000003d mov bx, ax 0x00000040 cmc 0x00000041 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4623B0 second address: 462465 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBD04BA4848h 0x00000004 rcr eax, 08h 0x00000007 push dword ptr [esp+1Ch] 0x0000000b retn 0020h 0x0000000e push ebp 0x0000000f mov bl, cl 0x00000011 bsf bp, ax 0x00000015 jns 00007FBD04BA46B3h 0x0000001b call 00007FBD04BA4841h 0x00000020 pushad 0x00000021 not dh 0x00000023 not bl 0x00000025 bsf edx, ebp 0x00000028 xchg dword ptr [esp+20h], ebx 0x0000002c jmp 00007FBD04BA4794h 0x0000002e btc ebp, edx 0x00000031 mov eax, ecx 0x00000033 shl eax, cl 0x00000035 mov edx, dword ptr [esp] 0x00000038 xchg eax, ebp 0x00000039 lea ebx, dword ptr [ebx-0000001Bh] 0x0000003f jmp 00007FBD04BA47A9h 0x00000041 xchg ah, al 0x00000043 mov dl, 36h 0x00000045 xchg dl, dh 0x00000047 push bx 0x00000049 xchg bp, dx 0x0000004c lea esp, dword ptr [esp+02h] 0x00000050 jmp 00007FBD04BA47EAh 0x00000052 xchg dword ptr [esp+20h], ebx 0x00000056 mov bh, byte ptr [esp] 0x00000059 clc 0x0000005a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 46E126 second address: 46E198 instructions: 0x00000000 rdtsc 0x00000002 lea eax, dword ptr [edx-54A5BC8Bh] 0x00000008 jmp 00007FBD04820F21h 0x0000000a mov ax, word ptr [esp] 0x0000000e inc dh 0x00000010 jle 00007FBD04820F61h 0x00000012 jnle 00007FBD04820F5Fh 0x00000014 sub bl, cl 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 46E50D second address: 46E55D instructions: 0x00000000 rdtsc 0x00000002 xchg dl, dh 0x00000004 jmp 00007FBD04BA4815h 0x00000006 ror bl, 00000000h 0x00000009 neg eax 0x0000000b jnle 00007FBD04BA4788h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4C6936 second address: 4C6938 instructions: 0x00000000 rdtsc 0x00000002 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4A2CDA second address: 4A2CDF instructions: 0x00000000 rdtsc 0x00000002 not ax 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 44F55C second address: 44F6CE instructions: 0x00000000 rdtsc 0x00000002 mov ebx, 4A18971Dh 0x00000007 xchg bx, ax 0x0000000a xor ah, ah 0x0000000c jmp 00007FBD04820F88h 0x0000000e shr dh, 00000006h 0x00000011 jmp 00007FBD04820EF7h 0x00000013 ror ebp, 00000000h 0x00000016 mov bx, 258Eh 0x0000001a or ebx, ebx 0x0000001c jc 00007FBD04821026h 0x00000022 jnc 00007FBD04820F9Bh 0x00000028 not bx 0x0000002b lea ebx, dword ptr [00000000h+esi*4] 0x00000032 inc bl 0x00000034 jmp 00007FBD04820F95h 0x00000039 jmp 00007FBD04820E40h 0x0000003e xor ebp, 4F446086h 0x00000044 shr ebx, cl 0x00000046 jbe 00007FBD04820EF2h 0x00000048 mov dl, byte ptr [esp] 0x0000004b jmp 00007FBD04820F16h 0x0000004d bswap eax 0x0000004f mov bh, byte ptr [esp] 0x00000052 mov bx, bp 0x00000055 jmp 00007FBD04820F16h 0x00000057 bts ebx, edi 0x0000005a call 00007FBD04820F52h 0x0000005f sub esp, 0Dh 0x00000062 not ebx 0x00000064 mov bx, word ptr [esp+08h] 0x00000069 lea esp, dword ptr [esp+01h] 0x0000006d xchg dword ptr [esp+0Ch], ebp 0x00000071 jmp 00007FBD04820EE8h 0x00000073 lea eax, dword ptr [00000000h+ecx*4] 0x0000007a setnl ah 0x0000007d call 00007FBD04820F30h 0x00000082 call 00007FBD04820F3Ch 0x00000087 lea ebp, dword ptr [ebp+67h] 0x0000008a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49872B second address: 49872D instructions: 0x00000000 rdtsc 0x00000002 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49872D second address: 4987EF instructions: 0x00000000 rdtsc 0x00000002 not dl 0x00000004 not bl 0x00000006 jmp 00007FBD04820EC8h 0x00000008 xchg dword ptr [esp], edx 0x0000000b mov bx, word ptr [esp] 0x0000000f xchg ah, bh 0x00000011 lea edx, dword ptr [edx-00000118h] 0x00000017 bsr eax, eax 0x0000001a lea eax, dword ptr [00000000h+ebx*4] 0x00000021 jmp 00007FBD04820EE1h 0x00000023 inc bh 0x00000025 mov al, bl 0x00000027 xchg dword ptr [esp], edx 0x0000002a bsf eax, eax 0x0000002d setp al 0x00000030 rcr al, 00000002h 0x00000033 jmp 00007FBD04820F31h 0x00000035 neg dx 0x00000038 push dword ptr [esp] 0x0000003b retn 0004h 0x0000003e sub esi, 02h 0x00000041 mov dh, dl 0x00000043 mov ax, word ptr [esp] 0x00000047 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49788F second address: 49790A instructions: 0x00000000 rdtsc 0x00000002 mov bx, word ptr [esp] 0x00000006 jmp 00007FBD04BA4842h 0x00000008 mov ebx, dword ptr [edi] 0x0000000a push esi 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49790A second address: 4979E5 instructions: 0x00000000 rdtsc 0x00000002 mov dl, byte ptr [edi+04h] 0x00000005 jmp 00007FBD04820EC6h 0x00000007 bts eax, esi 0x0000000a jle 00007FBD04820EE8h 0x0000000c lea eax, dword ptr [CE4B721Bh] 0x00000012 lea eax, dword ptr [00000000h+ebp*4] 0x00000019 jmp 00007FBD04820F16h 0x0000001b sub edi, 02h 0x0000001e mov ah, bh 0x00000020 not al 0x00000022 mov al, byte ptr [esp] 0x00000025 cmc 0x00000026 jmp 00007FBD04820F16h 0x00000028 jne 00007FBD04820ED1h 0x0000002a xchg edx, ecx 0x0000002c mov ax, bx 0x0000002f mov ax, 0B8Eh 0x00000033 jmp 00007FBD04820F7Fh 0x00000035 rol ebx, cl 0x00000037 setnp ah 0x0000003a not al 0x0000003c mov ax, dx 0x0000003f jmp 00007FBD04820EF0h 0x00000041 xchg edx, ecx 0x00000043 lea eax, dword ptr [ebp-0000CD0Bh] 0x00000049 bswap eax 0x0000004b mov ax, word ptr [esp] 0x0000004f jmp 00007FBD04820FCDh 0x00000054 mov dword ptr [edi+04h], ebx 0x00000057 lea ebx, dword ptr [6C50EA05h] 0x0000005d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49C124 second address: 49BFCE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBD04BA4675h 0x00000007 xchg dword ptr [esp], edi 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49C9DC second address: 49CA5F instructions: 0x00000000 rdtsc 0x00000002 setnl al 0x00000005 not dh 0x00000007 jmp 00007FBD04820EE3h 0x00000009 lea edx, dword ptr [edi+ebp] 0x0000000c dec ebp 0x0000000d mov ax, 64B7h 0x00000011 mov dx, 7257h 0x00000015 mov dh, byte ptr [esp] 0x00000018 jmp 00007FBD04820FA8h 0x0000001d mov eax, ebx 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 475F3F second address: 460A8B instructions: 0x00000000 rdtsc 0x00000002 call 00007FBD04BA47ECh 0x00000007 pop word ptr [esp] 0x0000000b push word ptr [esp] 0x0000000f js 00007FBD04BA47B1h 0x00000011 jns 00007FBD04BA47F0h 0x00000013 sub esi, 08h 0x00000016 cmc 0x00000017 jns 00007FBD04BA47AEh 0x00000019 sub esp, 0Fh 0x0000001c jmp 00007FBD04BA482Fh 0x0000001e lea esp, dword ptr [esp] 0x00000021 mov byte ptr [esp+06h], cl 0x00000025 lea esp, dword ptr [esp+03h] 0x00000029 jmp 00007FBD04BA4768h 0x0000002b mov dword ptr [esi], edx 0x0000002d lea edx, dword ptr [ebx+ebp] 0x00000030 bswap edx 0x00000032 jmp 00007FBD04BA4810h 0x00000034 xchg eax, ebx 0x00000035 clc 0x00000036 jnl 00007FBD04BA4807h 0x00000038 mov dx, bp 0x0000003b jmp 00007FBD04BA47B7h 0x0000003d xchg dh, dl 0x0000003f sete dl 0x00000042 jmp 00007FBD04BA47E6h 0x00000044 mov dword ptr [esi+04h], ebx 0x00000047 sub esp, 11h 0x0000004a jmp 00007FBD04BA4832h 0x0000004c jnle 00007FBD04BA4774h 0x0000004e mov edx, 5FBC1226h 0x00000053 mov edx, ebx 0x00000055 lea esp, dword ptr [esp+01h] 0x00000059 jmp 00007FBD04B8F22Ch 0x0000005e neg bx 0x00000061 jp 00007FBD04BA47B7h 0x00000063 mov eax, esp 0x00000065 jmp 00007FBD04BA47ECh 0x00000067 mov ah, 02h 0x00000069 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 47A373 second address: 47A3B6 instructions: 0x00000000 rdtsc 0x00000002 mov ah, dl 0x00000004 xchg dword ptr [esp], eax 0x00000007 bswap edx 0x00000009 jmp 00007FBD04820F52h 0x0000000b bsr dx, dx 0x0000000f mov dx, word ptr [esp] 0x00000013 neg dx 0x00000016 lea eax, dword ptr [eax-000000C3h] 0x0000001c lea edx, dword ptr [00000000h+edx*4] 0x00000023 pushfd 0x00000024 jmp 00007FBD04820EE1h 0x00000026 lea edx, dword ptr [esi+2152D358h] 0x0000002c mov dl, byte ptr [esp+03h] 0x00000030 xchg dword ptr [esp+04h], eax 0x00000034 rdtsc |
Source: C:\ProgramData\javaw.exe | RDTSC instruction interceptor: First address: 4FAE3F second address: 4FAE0D instructions: 0x00000000 rdtsc 0x00000002 mov cl, E4h 0x00000004 mov cl, ah 0x00000006 jmp 00007FBD04BA4796h 0x00000008 bswap eax 0x0000000a rdtsc |
Source: C:\ProgramData\javaw.exe | RDTSC instruction interceptor: First address: 4FAE0D second address: 4FAE47 instructions: 0x00000000 rdtsc 0x00000002 mov edx, dword ptr [esp] 0x00000005 mov edi, edx 0x00000007 mov cx, D400h 0x0000000b lea ebp, dword ptr [esp+edx] 0x0000000e jmp 00007FBD04820EEAh 0x00000010 mov ebx, edx 0x00000012 lea esi, dword ptr [00000000h+ebp*4] 0x00000019 xchg cx, bp 0x0000001c mov bl, byte ptr [esp] 0x0000001f jmp 00007FBD04820F29h 0x00000021 mov edi, dword ptr [esp] 0x00000024 mov ecx, C7CA738Bh 0x00000029 mov ah, F9h 0x0000002b mov bp, word ptr [esp] 0x0000002f xchg cl, al 0x00000031 xchg ecx, edx 0x00000033 jmp 00007FBD04820F98h 0x00000038 xchg bx, cx 0x0000003b lea edx, dword ptr [B38AD51Bh] 0x00000041 mov esi, EE51B137h 0x00000046 mov ecx, dword ptr [esp] 0x00000049 lea eax, dword ptr [esp+ebp] 0x0000004c mov dh, bl 0x0000004e jmp 00007FBD04820EB6h 0x00000050 mov ecx, dword ptr [esp] 0x00000053 mov dh, byte ptr [esp] 0x00000056 xchg di, dx 0x00000059 not bl 0x0000005b xchg edx, ebp 0x0000005d lea ebx, dword ptr [eax+ebp] 0x00000060 jmp 00007FBD04820ED4h 0x00000062 rdtsc |
Source: C:\ProgramData\javaw.exe | RDTSC instruction interceptor: First address: 4FAE47 second address: 4FAE49 instructions: 0x00000000 rdtsc 0x00000002 rdtsc |
Source: C:\ProgramData\javaw.exe | RDTSC instruction interceptor: First address: 44F5A7 second address: 44F43C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBD04820E93h 0x00000004 xchg ax, bx 0x00000006 call 00007FBD04820EB2h 0x0000000b mov dh, cl 0x0000000d sub esp, 14h 0x00000010 mov edx, dword ptr [esp+0Fh] 0x00000014 xchg dword ptr [esp+05h], edx 0x00000018 jmp 00007FBD04820E8Fh 0x0000001d xchg dword ptr [esp+14h], edx 0x00000021 shl ebx, 06h 0x00000024 mov ax, si 0x00000027 mov ebx, 17CE373Dh 0x0000002c sub esp, 05h 0x0000002f call 00007FBD04820EB6h 0x00000034 lea esp, dword ptr [esp+01h] 0x00000038 jmp 00007FBD04820EF6h 0x0000003a lea edx, dword ptr [edx+000000D3h] 0x00000040 stc 0x00000041 mov eax, edi 0x00000043 mov al, C7h 0x00000045 bswap ebx 0x00000047 jmp 00007FBD04820F35h 0x00000049 mov eax, 02C65B77h 0x0000004e xchg dword ptr [esp+1Ch], edx 0x00000052 xchg bx, dx 0x00000055 rdtsc |
Source: C:\ProgramData\javaw.exe | RDTSC instruction interceptor: First address: 44F43C second address: 44F5C1 instructions: 0x00000000 rdtsc 0x00000002 lea ebx, dword ptr [esp+0Bh] 0x00000006 push dword ptr [esp+1Ch] 0x0000000a retn 0020h 0x0000000d mov dx, word ptr [esp] 0x00000011 jmp 00007FBD04BA45E0h 0x00000016 mov edx, 8724C233h 0x0000001b sub esp, 1Ah 0x0000001e jno 00007FBD04BA4837h 0x00000020 mov edx, ecx 0x00000022 mov dx, word ptr [esp] 0x00000026 lea esp, dword ptr [esp+02h] 0x0000002a lea esp, dword ptr [esp+18h] 0x0000002e neg ebp 0x00000030 mov bx, ax 0x00000033 mov dh, 56h 0x00000035 jmp 00007FBD04BA487Bh 0x0000003a sub esp, 10h 0x0000003d jnc 00007FBD04BA47B7h 0x0000003f bswap edx 0x00000041 lea esp, dword ptr [esp+07h] 0x00000045 jmp 00007FBD04BA4807h 0x00000047 pop eax 0x00000048 call 00007FBD04BA47E5h 0x0000004d lea esp, dword ptr [esp+01h] 0x00000051 lea esp, dword ptr [esp+08h] 0x00000055 xor ebp, 19DD69F3h 0x0000005b jmp 00007FBD04BA4793h 0x0000005d neg ax 0x00000060 jl 00007FBD04BA4837h 0x00000062 rdtsc |
Source: C:\ProgramData\javaw.exe | RDTSC instruction interceptor: First address: 44F5C1 second address: 44F6CE instructions: 0x00000000 rdtsc 0x00000002 mov ebx, 4A18971Dh 0x00000007 jmp 00007FBD04820EF3h 0x00000009 xchg bx, ax 0x0000000c xor ah, ah 0x0000000e shr dh, 00000006h 0x00000011 jmp 00007FBD04820F27h 0x00000013 ror ebp, 00000000h 0x00000016 mov bx, 258Eh 0x0000001a or ebx, ebx 0x0000001c jc 00007FBD04821026h 0x00000022 jnc 00007FBD04820F9Bh 0x00000028 not bx 0x0000002b lea ebx, dword ptr [00000000h+esi*4] 0x00000032 inc bl 0x00000034 jmp 00007FBD04820F95h 0x00000039 jmp 00007FBD04820E40h 0x0000003e xor ebp, 4F446086h 0x00000044 shr ebx, cl 0x00000046 jbe 00007FBD04820EF2h 0x00000048 mov dl, byte ptr [esp] 0x0000004b jmp 00007FBD04820F16h 0x0000004d bswap eax 0x0000004f mov bh, byte ptr [esp] 0x00000052 mov bx, bp 0x00000055 jmp 00007FBD04820F16h 0x00000057 bts ebx, edi 0x0000005a call 00007FBD04820F52h 0x0000005f sub esp, 0Dh 0x00000062 not ebx 0x00000064 mov bx, word ptr [esp+08h] 0x00000069 lea esp, dword ptr [esp+01h] 0x0000006d xchg dword ptr [esp+0Ch], ebp 0x00000071 jmp 00007FBD04820EE8h 0x00000073 lea eax, dword ptr [00000000h+ecx*4] 0x0000007a setnl ah 0x0000007d call 00007FBD04820F30h 0x00000082 call 00007FBD04820F3Ch 0x00000087 lea ebp, dword ptr [ebp+67h] 0x0000008a rdtsc |
Source: C:\ProgramData\javaw.exe | RDTSC instruction interceptor: First address: 44F6CE second address: 44F8A9 instructions: 0x00000000 rdtsc 0x00000002 not dh 0x00000004 lea ebx, dword ptr [ecx+esi] 0x00000007 jmp 00007FBD04BA49A0h 0x0000000c xchg dword ptr [esp+14h], ebp 0x00000010 rdtsc |
Source: C:\ProgramData\javaw.exe | RDTSC instruction interceptor: First address: 45D953 second address: 45D994 instructions: 0x00000000 rdtsc 0x00000002 stc 0x00000003 call 00007FBD04820F4Eh 0x00000008 rdtsc |
Source: C:\ProgramData\javaw.exe | RDTSC instruction interceptor: First address: 468C67 second address: 468C53 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBD04BA47B2h 0x00000004 setl dl 0x00000007 push bx 0x00000009 xchg byte ptr [esp], ah 0x0000000c rdtsc |
Source: C:\ProgramData\javaw.exe | RDTSC instruction interceptor: First address: 46227E second address: 4622CE instructions: 0x00000000 rdtsc 0x00000002 call 00007FBD04820EEBh 0x00000007 mov bl, 14h 0x00000009 stc 0x0000000a mov dh, bh 0x0000000c mov ax, word ptr [esp] 0x00000010 xchg dword ptr [esp], edx 0x00000013 jmp 00007FBD04820F45h 0x00000015 mov bh, byte ptr [esp] 0x00000018 mov bx, 3147h 0x0000001c mov ebx, DE4C7237h 0x00000021 mov ebx, dword ptr [esp] 0x00000024 lea edx, dword ptr [edx-0000004Dh] 0x0000002a bsr eax, esp 0x0000002d jmp 00007FBD04820EE2h 0x0000002f setne ah 0x00000032 inc bx 0x00000034 xchg dword ptr [esp], edx 0x00000037 bt edx, edi 0x0000003a mov dl, byte ptr [esp] 0x0000003d xchg al, ah 0x0000003f jmp 00007FBD04820F5Eh 0x00000041 mov ah, DEh 0x00000043 push dword ptr [esp] 0x00000046 retn 0004h 0x00000049 push ecx 0x0000004a shl al, cl 0x0000004c jno 00007FBD04820FA3h 0x00000052 rdtsc |
Source: C:\ProgramData\javaw.exe | RDTSC instruction interceptor: First address: 45DCF2 second address: 45DD44 instructions: 0x00000000 rdtsc 0x00000002 xchg ax, dx 0x00000004 push esi 0x00000005 shr si, cl 0x00000008 jne 00007FBD04BA47B1h 0x0000000a jmp 00007FBD04BA4811h 0x0000000c neg dh 0x0000000e sub esp, 09h 0x00000011 mov word ptr [esp], bp 0x00000015 call 00007FBD04BA47ECh 0x0000001a not bx 0x0000001d rdtsc |
Source: C:\ProgramData\javaw.exe | RDTSC instruction interceptor: First address: 45DD44 second address: 45DFA9 instructions: 0x00000000 rdtsc 0x00000002 mov si, ax 0x00000005 mov ax, sp 0x00000008 xchg dword ptr [esp], ebx 0x0000000b jmp 00007FBD04820EECh 0x0000000d lea edx, dword ptr [eax+ebx] 0x00000010 mov dl, BAh 0x00000012 btc dx, bx 0x00000016 lea ebx, dword ptr [ebx+5Bh] 0x00000019 jmp 00007FBD04820F40h 0x0000001b mov si, F9BFh 0x0000001f lea esi, dword ptr [edi+72703053h] 0x00000025 mov dl, F5h 0x00000027 bsf ax, bx 0x0000002b xchg dword ptr [esp], ebx 0x0000002e mov al, ah 0x00000030 jmp 00007FBD04820EE5h 0x00000032 pushfd 0x00000033 mov eax, dword ptr [esp] 0x00000036 sub esp, 12h 0x00000039 lea esp, dword ptr [esp+02h] 0x0000003d push dword ptr [esp+14h] 0x00000041 retn 0018h 0x00000044 lea esp, dword ptr [esp+01h] 0x00000048 jmp 00007FBD04820F22h 0x0000004a bsr ebx, edx 0x0000004d jnp 00007FBD0482110Eh 0x00000053 mov eax, 7A7AB50Dh 0x00000058 lea edx, dword ptr [00000000h+ebp*4] 0x0000005f push ecx 0x00000060 rdtsc |
Source: C:\ProgramData\javaw.exe | RDTSC instruction interceptor: First address: 4626B2 second address: 4626B4 instructions: 0x00000000 rdtsc 0x00000002 rdtsc |
Source: C:\ProgramData\javaw.exe | RDTSC instruction interceptor: First address: 4614E1 second address: 44F5A7 instructions: 0x00000000 rdtsc 0x00000002 lea ebx, dword ptr [ebx-000028E1h] 0x00000008 clc 0x00000009 jne 00007FBD04820EF1h 0x0000000b pop edi 0x0000000c jmp 00007FBD04820F32h 0x0000000e mov al, dl 0x00000010 sub esp, 17h 0x00000013 jmp 00007FBD04821002h 0x00000018 jp 00007FBD04820E24h 0x0000001e mov dx, 612Dh 0x00000022 xchg ah, bh 0x00000024 jmp 00007FBD04820E78h 0x00000029 lea esp, dword ptr [esp+03h] 0x0000002d jmp 00007FBD04820EE6h 0x0000002f add esp, 1Ch 0x00000032 jno 00007FBD04820EF7h 0x00000034 pop ebp 0x00000035 inc bh 0x00000037 jmp 00007FBD04820F7Eh 0x00000039 jne 00007FBD04820EBCh 0x0000003b shr al, 00000005h 0x0000003e bts edx, edx 0x00000041 jmp 00007FBD04820F45h 0x00000043 pop esi 0x00000044 jmp 00007FBD0480ED6Ah 0x00000049 mov ecx, ebp 0x0000004b bt ebx, edi 0x0000004e je 00007FBD04821135h 0x00000054 pushad 0x00000055 jmp 00007FBD048210D4h 0x0000005a add esp, 0Ah 0x0000005d lea esp, dword ptr [esp+02h] 0x00000061 rdtsc |
Source: C:\ProgramData\javaw.exe | RDTSC instruction interceptor: First address: 4643D2 second address: 464417 instructions: 0x00000000 rdtsc 0x00000002 mov dh, bl 0x00000004 mov dx, 8786h 0x00000008 shr eax, 00000000h 0x0000000b xchg dx, ax 0x0000000e jmp 00007FBD04BA47ACh 0x00000010 xchg dword ptr [esp], ebp 0x00000013 cmc 0x00000014 bsr dx, sp 0x00000018 not ah 0x0000001a bswap eax 0x0000001c bswap eax 0x0000001e jmp 00007FBD04BA4A4Ah 0x00000023 lea ebp, dword ptr [ebp-00000021h] 0x00000029 bswap edx 0x0000002b sete al 0x0000002e stc 0x0000002f mov dx, word ptr [esp] 0x00000033 xchg dword ptr [esp], ebp 0x00000036 jmp 00007FBD04BA467Eh 0x0000003b sbb eax, edx 0x0000003d mov edx, 2D87C49Bh 0x00000042 neg ax 0x00000045 bsf eax, ebp 0x00000048 sbb eax, 377E77FDh 0x0000004d push dword ptr [esp] 0x00000050 retn 0004h 0x00000053 mov al, ah 0x00000055 jmp 00007FBD04BA485Ch 0x0000005a mov dx, 1D8Dh 0x0000005e xchg dx, ax 0x00000061 xor dl, 00000062h 0x00000064 jnbe 00007FBD04BA47AAh 0x00000066 xchg ah, dh 0x00000068 jmp 00007FBD04BA47B8h 0x0000006a bsr dx, bx 0x0000006e lea eax, dword ptr [esp-3Bh] 0x00000072 mov ah, byte ptr [esp] 0x00000075 jmp 00007FBD04BA47DFh 0x00000077 lea edx, dword ptr [00000000h+esi*4] 0x0000007e rdtsc |
Source: C:\ProgramData\javaw.exe | RDTSC instruction interceptor: First address: 464417 second address: 4644C0 instructions: 0x00000000 rdtsc 0x00000002 rcr ah, 00000007h 0x00000005 jg 00007FBD04820FB4h 0x0000000b rdtsc |
Source: C:\ProgramData\javaw.exe | RDTSC instruction interceptor: First address: 464765 second address: 4647BF instructions: 0x00000000 rdtsc 0x00000002 mov ax, 49FAh 0x00000006 mov dh, bh 0x00000008 jmp 00007FBD04BA47FBh 0x0000000a mov al, 24h 0x0000000c xchg dx, ax 0x0000000f lea eax, dword ptr [esi-43A12DA5h] 0x00000015 rol bl, 00000000h 0x00000018 bsf ax, bx 0x0000001c jmp 00007FBD04BA47FBh 0x0000001e jnp 00007FBD04BA477Dh 0x00000020 stc 0x00000021 sub esp, 1Eh 0x00000024 jmp 00007FBD04BA47B4h 0x00000026 rdtsc |
Source: C:\ProgramData\javaw.exe | RDTSC instruction interceptor: First address: 468CEE second address: 468C53 instructions: 0x00000000 rdtsc 0x00000002 setl dl 0x00000005 push bx 0x00000007 jmp 00007FBD04820E6Bh 0x0000000c xchg byte ptr [esp], ah 0x0000000f rdtsc |
Source: C:\ProgramData\javaw.exe | RDTSC instruction interceptor: First address: 46421C second address: 451FCF instructions: 0x00000000 rdtsc 0x00000002 rcl bl, 00000004h 0x00000005 jns 00007FBD04BA48D2h 0x0000000b shl ebx, cl 0x0000000d jmp 00007FBD04BA48B3h 0x00000012 neg bx 0x00000015 dec ax 0x00000017 jmp 00007FBD04BA47E9h 0x00000019 call 00007FBD04BA4896h 0x0000001e neg al 0x00000020 jp 00007FBD04BA4776h 0x00000022 jnp 00007FBD04BA4774h 0x00000024 jmp 00007FBD04BA47A3h 0x00000026 add esp, 04h 0x00000029 jnle 00007FBD04BA47A7h 0x0000002b pop ecx 0x0000002c jmp 00007FBD04B92453h 0x00000031 mov ecx, edi 0x00000033 xchg al, bl 0x00000035 xchg ah, dh 0x00000037 rdtsc |
Source: C:\ProgramData\javaw.exe | RDTSC instruction interceptor: First address: 4624DF second address: 4623B0 instructions: 0x00000000 rdtsc 0x00000002 setl bh 0x00000005 xor eax, eax 0x00000007 btr edx, ebx 0x0000000a jmp 00007FBD04820E0Bh 0x0000000f xchg dword ptr [esp], ebp 0x00000012 xchg dx, bx 0x00000015 sub bh, bl 0x00000017 clc 0x00000018 mov bh, 48h 0x0000001a xchg ebx, edx 0x0000001c jmp 00007FBD04820ED9h 0x0000001e lea ebp, dword ptr [ebp+00000197h] 0x00000024 bsf eax, edi 0x00000027 sub esp, 11h 0x0000002a and edx, ebp 0x0000002c xchg byte ptr [esp+0Ch], dl 0x00000030 sub esp, 0Eh 0x00000033 jmp 00007FBD04820EE5h 0x00000035 lea esp, dword ptr [esp+03h] 0x00000039 xchg dword ptr [esp+1Ch], ebp 0x0000003d mov bx, ax 0x00000040 cmc 0x00000041 rdtsc |
Source: C:\ProgramData\javaw.exe | RDTSC instruction interceptor: First address: 4623B0 second address: 462465 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBD04BA4848h 0x00000004 rcr eax, 08h 0x00000007 push dword ptr [esp+1Ch] 0x0000000b retn 0020h 0x0000000e push ebp 0x0000000f mov bl, cl 0x00000011 bsf bp, ax 0x00000015 jns 00007FBD04BA46B3h 0x0000001b call 00007FBD04BA4841h 0x00000020 pushad 0x00000021 not dh 0x00000023 not bl 0x00000025 bsf edx, ebp 0x00000028 xchg dword ptr [esp+20h], ebx 0x0000002c jmp 00007FBD04BA4794h 0x0000002e btc ebp, edx 0x00000031 mov eax, ecx 0x00000033 shl eax, cl 0x00000035 mov edx, dword ptr [esp] 0x00000038 xchg eax, ebp 0x00000039 lea ebx, dword ptr [ebx-0000001Bh] 0x0000003f jmp 00007FBD04BA47A9h 0x00000041 xchg ah, al 0x00000043 mov dl, 36h 0x00000045 xchg dl, dh 0x00000047 push bx 0x00000049 xchg bp, dx 0x0000004c lea esp, dword ptr [esp+02h] 0x00000050 jmp 00007FBD04BA47EAh 0x00000052 xchg dword ptr [esp+20h], ebx 0x00000056 mov bh, byte ptr [esp] 0x00000059 clc 0x0000005a rdtsc |
Source: C:\ProgramData\javaw.exe | RDTSC instruction interceptor: First address: 46E126 second address: 46E198 instructions: 0x00000000 rdtsc 0x00000002 lea eax, dword ptr [edx-54A5BC8Bh] 0x00000008 jmp 00007FBD04820F21h 0x0000000a mov ax, word ptr [esp] 0x0000000e inc dh 0x00000010 jle 00007FBD04820F61h 0x00000012 jnle 00007FBD04820F5Fh 0x00000014 sub bl, cl 0x00000016 rdtsc |
Source: C:\ProgramData\javaw.exe | RDTSC instruction interceptor: First address: 46E50D second address: 46E55D instructions: 0x00000000 rdtsc 0x00000002 xchg dl, dh 0x00000004 jmp 00007FBD04BA4815h 0x00000006 ror bl, 00000000h 0x00000009 neg eax 0x0000000b jnle 00007FBD04BA4788h 0x0000000d rdtsc |
Source: C:\ProgramData\javaw.exe | RDTSC instruction interceptor: First address: 4C6936 second address: 4C6938 instructions: 0x00000000 rdtsc 0x00000002 rdtsc |
Source: C:\ProgramData\javaw.exe | RDTSC instruction interceptor: First address: 4A2CDA second address: 4A2CDF instructions: 0x00000000 rdtsc 0x00000002 not ax 0x00000005 rdtsc |
Source: C:\ProgramData\javaw.exe | RDTSC instruction interceptor: First address: 44F55C second address: 44F6CE instructions: 0x00000000 rdtsc 0x00000002 mov ebx, 4A18971Dh 0x00000007 xchg bx, ax 0x0000000a xor ah, ah 0x0000000c jmp 00007FBD04820F88h 0x0000000e shr dh, 00000006h 0x00000011 jmp 00007FBD04820EF7h 0x00000013 ror ebp, 00000000h 0x00000016 mov bx, 258Eh 0x0000001a or ebx, ebx 0x0000001c jc 00007FBD04821026h 0x00000022 jnc 00007FBD04820F9Bh 0x00000028 not bx 0x0000002b lea ebx, dword ptr [00000000h+esi*4] 0x00000032 inc bl 0x00000034 jmp 00007FBD04820F95h 0x00000039 jmp 00007FBD04820E40h 0x0000003e xor ebp, 4F446086h 0x00000044 shr ebx, cl 0x00000046 jbe 00007FBD04820EF2h 0x00000048 mov dl, byte ptr [esp] 0x0000004b jmp 00007FBD04820F16h 0x0000004d bswap eax 0x0000004f mov bh, byte ptr [esp] 0x00000052 mov bx, bp 0x00000055 jmp 00007FBD04820F16h 0x00000057 bts ebx, edi 0x0000005a call 00007FBD04820F52h 0x0000005f sub esp, 0Dh 0x00000062 not ebx 0x00000064 mov bx, word ptr [esp+08h] 0x00000069 lea esp, dword ptr [esp+01h] 0x0000006d xchg dword ptr [esp+0Ch], ebp 0x00000071 jmp 00007FBD04820EE8h 0x00000073 lea eax, dword ptr [00000000h+ecx*4] 0x0000007a setnl ah 0x0000007d call 00007FBD04820F30h 0x00000082 call 00007FBD04820F3Ch 0x00000087 lea ebp, dword ptr [ebp+67h] 0x0000008a rdtsc |
Source: C:\ProgramData\javaw.exe | RDTSC instruction interceptor: First address: 49872B second address: 49872D instructions: 0x00000000 rdtsc 0x00000002 rdtsc |
Source: C:\ProgramData\javaw.exe | RDTSC instruction interceptor: First address: 49872D second address: 4987EF instructions: 0x00000000 rdtsc 0x00000002 not dl 0x00000004 not bl 0x00000006 jmp 00007FBD04820EC8h 0x00000008 xchg dword ptr [esp], edx 0x0000000b mov bx, word ptr [esp] 0x0000000f xchg ah, bh 0x00000011 lea edx, dword ptr [edx-00000118h] 0x00000017 bsr eax, eax 0x0000001a lea eax, dword ptr [00000000h+ebx*4] 0x00000021 jmp 00007FBD04820EE1h 0x00000023 inc bh 0x00000025 mov al, bl 0x00000027 xchg dword ptr [esp], edx 0x0000002a bsf eax, eax 0x0000002d setp al 0x00000030 rcr al, 00000002h 0x00000033 jmp 00007FBD04820F31h 0x00000035 neg dx 0x00000038 push dword ptr [esp] 0x0000003b retn 0004h 0x0000003e sub esi, 02h 0x00000041 mov dh, dl 0x00000043 mov ax, word ptr [esp] 0x00000047 rdtsc |
Source: C:\ProgramData\javaw.exe | RDTSC instruction interceptor: First address: 49788F second address: 49790A instructions: 0x00000000 rdtsc 0x00000002 mov bx, word ptr [esp] 0x00000006 jmp 00007FBD04BA4842h 0x00000008 mov ebx, dword ptr [edi] 0x0000000a push esi 0x0000000b rdtsc |
Source: C:\ProgramData\javaw.exe | RDTSC instruction interceptor: First address: 49790A second address: 4979E5 instructions: 0x00000000 rdtsc 0x00000002 mov dl, byte ptr [edi+04h] 0x00000005 jmp 00007FBD04820EC6h 0x00000007 bts eax, esi 0x0000000a jle 00007FBD04820EE8h 0x0000000c lea eax, dword ptr [CE4B721Bh] 0x00000012 lea eax, dword ptr [00000000h+ebp*4] 0x00000019 jmp 00007FBD04820F16h 0x0000001b sub edi, 02h 0x0000001e mov ah, bh 0x00000020 not al 0x00000022 mov al, byte ptr [esp] 0x00000025 cmc 0x00000026 jmp 00007FBD04820F16h 0x00000028 jne 00007FBD04820ED1h 0x0000002a xchg edx, ecx 0x0000002c mov ax, bx 0x0000002f mov ax, 0B8Eh 0x00000033 jmp 00007FBD04820F7Fh 0x00000035 rol ebx, cl 0x00000037 setnp ah 0x0000003a not al 0x0000003c mov ax, dx 0x0000003f jmp 00007FBD04820EF0h 0x00000041 xchg edx, ecx 0x00000043 lea eax, dword ptr [ebp-0000CD0Bh] 0x00000049 bswap eax 0x0000004b mov ax, word ptr [esp] 0x0000004f jmp 00007FBD04820FCDh 0x00000054 mov dword ptr [edi+04h], ebx 0x00000057 lea ebx, dword ptr [6C50EA05h] 0x0000005d rdtsc |
Source: C:\ProgramData\javaw.exe | RDTSC instruction interceptor: First address: 49C124 second address: 49BFCE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBD04BA4675h 0x00000007 xchg dword ptr [esp], edi 0x0000000a rdtsc |
Source: C:\ProgramData\javaw.exe | RDTSC instruction interceptor: First address: 49C9DC second address: 49CA5F instructions: 0x00000000 rdtsc 0x00000002 setnl al 0x00000005 not dh 0x00000007 jmp 00007FBD04820EE3h 0x00000009 lea edx, dword ptr [edi+ebp] 0x0000000c dec ebp 0x0000000d mov ax, 64B7h 0x00000011 mov dx, 7257h 0x00000015 mov dh, byte ptr [esp] 0x00000018 jmp 00007FBD04820FA8h 0x0000001d mov eax, ebx 0x0000001f rdtsc |
Source: C:\ProgramData\javaw.exe | RDTSC instruction interceptor: First address: 475F3F second address: 460A8B instructions: 0x00000000 rdtsc 0x00000002 call 00007FBD04BA47ECh 0x00000007 pop word ptr [esp] 0x0000000b push word ptr [esp] 0x0000000f js 00007FBD04BA47B1h 0x00000011 jns 00007FBD04BA47F0h 0x00000013 sub esi, 08h 0x00000016 cmc 0x00000017 jns 00007FBD04BA47AEh 0x00000019 sub esp, 0Fh 0x0000001c jmp 00007FBD04BA482Fh 0x0000001e lea esp, dword ptr [esp] 0x00000021 mov byte ptr [esp+06h], cl 0x00000025 lea esp, dword ptr [esp+03h] 0x00000029 jmp 00007FBD04BA4768h 0x0000002b mov dword ptr [esi], edx 0x0000002d lea edx, dword ptr [ebx+ebp] 0x00000030 bswap edx 0x00000032 jmp 00007FBD04BA4810h 0x00000034 xchg eax, ebx 0x00000035 clc 0x00000036 jnl 00007FBD04BA4807h 0x00000038 mov dx, bp 0x0000003b jmp 00007FBD04BA47B7h 0x0000003d xchg dh, dl 0x0000003f sete dl 0x00000042 jmp 00007FBD04BA47E6h 0x00000044 mov dword ptr [esi+04h], ebx 0x00000047 sub esp, 11h 0x0000004a jmp 00007FBD04BA4832h 0x0000004c jnle 00007FBD04BA4774h 0x0000004e mov edx, 5FBC1226h 0x00000053 mov edx, ebx 0x00000055 lea esp, dword ptr [esp+01h] 0x00000059 jmp 00007FBD04B8F22Ch 0x0000005e neg bx 0x00000061 jp 00007FBD04BA47B7h 0x00000063 mov eax, esp 0x00000065 jmp 00007FBD04BA47ECh 0x00000067 mov ah, 02h 0x00000069 rdtsc |
Source: C:\ProgramData\javaw.exe | RDTSC instruction interceptor: First address: 47A373 second address: 47A3B6 instructions: 0x00000000 rdtsc 0x00000002 mov ah, dl 0x00000004 xchg dword ptr [esp], eax 0x00000007 bswap edx 0x00000009 jmp 00007FBD04820F52h 0x0000000b bsr dx, dx 0x0000000f mov dx, word ptr [esp] 0x00000013 neg dx 0x00000016 lea eax, dword ptr [eax-000000C3h] 0x0000001c lea edx, dword ptr [00000000h+edx*4] 0x00000023 pushfd 0x00000024 jmp 00007FBD04820EE1h 0x00000026 lea edx, dword ptr [esi+2152D358h] 0x0000002c mov dl, byte ptr [esp+03h] 0x00000030 xchg dword ptr [esp+04h], eax 0x00000034 rdtsc |
Source: C:\ProgramData\javaw.exe | RDTSC instruction interceptor: First address: 49F168 second address: 45D990 instructions: 0x00000000 rdtsc 0x00000002 cmc 0x00000003 jc 00007FBD04BA47B7h 0x00000005 clc 0x00000006 jmp 00007FBD04BA47D6h 0x00000008 sub edi, 08h 0x0000000b push bx 0x0000000d lea esp, dword ptr [esp+02h] 0x00000011 call 00007FBD04BA4848h 0x00000016 xchg dword ptr [esp], edi 0x00000019 sub esp, 1Ch 0x0000001c mov byte ptr [esp+0Eh], cl 0x00000020 cmc 0x00000021 lea edi, dword ptr [edi+000000C5h] 0x00000027 jmp 00007FBD04BA478Bh 0x00000029 sub esp, 05h 0x0000002c pop word ptr [esp] 0x00000030 lea esp, dword ptr [esp+03h] 0x00000034 xchg dword ptr [esp+1Ch], edi 0x00000038 call 00007FBD04BA47A2h 0x0000003d call 00007FBD04BA47BAh 0x00000042 push dword ptr [esp+24h] 0x00000046 retn 0028h 0x00000049 xchg edx, ebx 0x0000004b jmp 00007FBD04BA472Eh 0x00000050 mov dword ptr [edi], ebx 0x00000052 call 00007FBD04BA47FCh 0x00000057 lea esp, dword ptr [esp+03h] 0x0000005b mov bh, byte ptr [esp] 0x0000005e setnb bh 0x00000061 lea esp, dword ptr [esp+01h] 0x00000065 jmp 00007FBD04BA480Bh 0x00000067 mov dword ptr [edi+04h], eax 0x0000006a setl ah 0x0000006d mov bx, word ptr [esp] 0x00000071 dec ax 0x00000073 jp 00007FBD04BA47AEh 0x00000075 mov ah, byte ptr [esp] 0x00000078 jmp 00007FBD04B62EB5h 0x0000007d jmp 00007FBD04BA481Fh 0x0000007f mov bh, byte ptr [esp] 0x00000082 mov ax, si 0x00000085 lea eax, dword ptr [ebp-6656654Ch] 0x0000008b not dx 0x0000008e lea ebx, dword ptr [esi+50h] 0x00000091 jmp 00007FBD04BA47A7h 0x00000093 shl eax, cl 0x00000095 jle 00007FBD04BA480Fh 0x00000097 lea edx, dword ptr [ecx+ebx] 0x0000009a rdtsc |
Source: C:\ProgramData\javaw.exe | RDTSC instruction interceptor: First address: 4FAE3F second address: 4FAE0D instructions: 0x00000000 rdtsc 0x00000002 mov cl, E4h 0x00000004 mov cl, ah 0x00000006 jmp 00007FBD04820ED6h 0x00000008 bswap eax 0x0000000a rdtsc |
Source: C:\ProgramData\javaw.exe | RDTSC instruction interceptor: First address: 4FAE0D second address: 4FAE47 instructions: 0x00000000 rdtsc 0x00000002 mov edx, dword ptr [esp] 0x00000005 mov edi, edx 0x00000007 mov cx, D400h 0x0000000b lea ebp, dword ptr [esp+edx] 0x0000000e jmp 00007FBD04BA47AAh 0x00000010 mov ebx, edx 0x00000012 lea esi, dword ptr [00000000h+ebp*4] 0x00000019 xchg cx, bp 0x0000001c mov bl, byte ptr [esp] 0x0000001f jmp 00007FBD04BA47E9h 0x00000021 mov edi, dword ptr [esp] 0x00000024 mov ecx, C7CA738Bh 0x00000029 mov ah, F9h 0x0000002b mov bp, word ptr [esp] 0x0000002f xchg cl, al 0x00000031 xchg ecx, edx 0x00000033 jmp 00007FBD04BA4858h 0x00000038 xchg bx, cx 0x0000003b lea edx, dword ptr [B38AD51Bh] 0x00000041 mov esi, EE51B137h 0x00000046 mov ecx, dword ptr [esp] 0x00000049 lea eax, dword ptr [esp+ebp] 0x0000004c mov dh, bl 0x0000004e jmp 00007FBD04BA4776h 0x00000050 mov ecx, dword ptr [esp] 0x00000053 mov dh, byte ptr [esp] 0x00000056 xchg di, dx 0x00000059 not bl 0x0000005b xchg edx, ebp 0x0000005d lea ebx, dword ptr [eax+ebp] 0x00000060 jmp 00007FBD04BA4794h 0x00000062 rdtsc |
Source: C:\ProgramData\javaw.exe | RDTSC instruction interceptor: First address: 44F5A7 second address: 44F43C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBD04BA4753h 0x00000004 xchg ax, bx 0x00000006 call 00007FBD04BA4772h 0x0000000b mov dh, cl 0x0000000d sub esp, 14h 0x00000010 mov edx, dword ptr [esp+0Fh] 0x00000014 xchg dword ptr [esp+05h], edx 0x00000018 jmp 00007FBD04BA474Fh 0x0000001d xchg dword ptr [esp+14h], edx 0x00000021 shl ebx, 06h 0x00000024 mov ax, si 0x00000027 mov ebx, 17CE373Dh 0x0000002c sub esp, 05h 0x0000002f call 00007FBD04BA4776h 0x00000034 lea esp, dword ptr [esp+01h] 0x00000038 jmp 00007FBD04BA47B6h 0x0000003a lea edx, dword ptr [edx+000000D3h] 0x00000040 stc 0x00000041 mov eax, edi 0x00000043 mov al, C7h 0x00000045 bswap ebx 0x00000047 jmp 00007FBD04BA47F5h 0x00000049 mov eax, 02C65B77h 0x0000004e xchg dword ptr [esp+1Ch], edx 0x00000052 xchg bx, dx 0x00000055 rdtsc |
Source: C:\ProgramData\javaw.exe | RDTSC instruction interceptor: First address: 44F43C second address: 44F5C1 instructions: 0x00000000 rdtsc 0x00000002 lea ebx, dword ptr [esp+0Bh] 0x00000006 push dword ptr [esp+1Ch] 0x0000000a retn 0020h 0x0000000d mov dx, word ptr [esp] 0x00000011 jmp 00007FBD04820D20h 0x00000016 mov edx, 8724C233h 0x0000001b sub esp, 1Ah 0x0000001e jno 00007FBD04820F77h 0x00000020 mov edx, ecx 0x00000022 mov dx, word ptr [esp] 0x00000026 lea esp, dword ptr [esp+02h] 0x0000002a lea esp, dword ptr [esp+18h] 0x0000002e neg ebp 0x00000030 mov bx, ax 0x00000033 mov dh, 56h 0x00000035 jmp 00007FBD04820FBBh 0x0000003a sub esp, 10h 0x0000003d jnc 00007FBD04820EF7h 0x0000003f bswap edx 0x00000041 lea esp, dword ptr [esp+07h] 0x00000045 jmp 00007FBD04820F47h 0x00000047 pop eax 0x00000048 call 00007FBD04820F25h 0x0000004d lea esp, dword ptr [esp+01h] 0x00000051 lea esp, dword ptr [esp+08h] 0x00000055 xor ebp, 19DD69F3h 0x0000005b jmp 00007FBD04820ED3h 0x0000005d neg ax 0x00000060 jl 00007FBD04820F77h 0x00000062 rdtsc |
Source: C:\ProgramData\javaw.exe | RDTSC instruction interceptor: First address: 44F5C1 second address: 44F6CE instructions: 0x00000000 rdtsc 0x00000002 mov ebx, 4A18971Dh 0x00000007 jmp 00007FBD04BA47B3h 0x00000009 xchg bx, ax 0x0000000c xor ah, ah 0x0000000e shr dh, 00000006h 0x00000011 jmp 00007FBD04BA47E7h 0x00000013 ror ebp, 00000000h 0x00000016 mov bx, 258Eh 0x0000001a or ebx, ebx 0x0000001c jc 00007FBD04BA48E6h 0x00000022 jnc 00007FBD04BA485Bh 0x00000028 not bx 0x0000002b lea ebx, dword ptr [00000000h+esi*4] 0x00000032 inc bl 0x00000034 jmp 00007FBD04BA4855h 0x00000039 jmp 00007FBD04BA4700h 0x0000003e xor ebp, 4F446086h 0x00000044 shr ebx, cl 0x00000046 jbe 00007FBD04BA47B2h 0x00000048 mov dl, byte ptr [esp] 0x0000004b jmp 00007FBD04BA47D6h 0x0000004d bswap eax 0x0000004f mov bh, byte ptr [esp] 0x00000052 mov bx, bp 0x00000055 jmp 00007FBD04BA47D6h 0x00000057 bts ebx, edi 0x0000005a call 00007FBD04BA4812h 0x0000005f sub esp, 0Dh 0x00000062 not ebx 0x00000064 mov bx, word ptr [esp+08h] 0x00000069 lea esp, dword ptr [esp+01h] 0x0000006d xchg dword ptr [esp+0Ch], ebp 0x00000071 jmp 00007FBD04BA47A8h 0x00000073 lea eax, dword ptr [00000000h+ecx*4] 0x0000007a setnl ah 0x0000007d call 00007FBD04BA47F0h 0x00000082 call 00007FBD04BA47FCh 0x00000087 lea ebp, dword ptr [ebp+67h] 0x0000008a rdtsc |
Source: C:\ProgramData\javaw.exe | RDTSC instruction interceptor: First address: 44F6CE second address: 44F8A9 instructions: 0x00000000 rdtsc 0x00000002 not dh 0x00000004 lea ebx, dword ptr [ecx+esi] 0x00000007 jmp 00007FBD048210E0h 0x0000000c xchg dword ptr [esp+14h], ebp 0x00000010 rdtsc |
Source: C:\ProgramData\javaw.exe | RDTSC instruction interceptor: First address: 45D953 second address: 45D994 instructions: 0x00000000 rdtsc 0x00000002 stc 0x00000003 call 00007FBD04BA480Eh 0x00000008 rdtsc |
Source: C:\ProgramData\javaw.exe | RDTSC instruction interceptor: First address: 468C67 second address: 468C53 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBD04820EF2h 0x00000004 setl dl 0x00000007 push bx 0x00000009 xchg byte ptr [esp], ah 0x0000000c rdtsc |
Source: C:\ProgramData\javaw.exe | RDTSC instruction interceptor: First address: 46227E second address: 4622CE instructions: 0x00000000 rdtsc 0x00000002 call 00007FBD04BA47ABh 0x00000007 mov bl, 14h 0x00000009 stc 0x0000000a mov dh, bh 0x0000000c mov ax, word ptr [esp] 0x00000010 xchg dword ptr [esp], edx 0x00000013 jmp 00007FBD04BA4805h 0x00000015 mov bh, byte ptr [esp] 0x00000018 mov bx, 3147h 0x0000001c mov ebx, DE4C7237h 0x00000021 mov ebx, dword ptr [esp] 0x00000024 lea edx, dword ptr [edx-0000004Dh] 0x0000002a bsr eax, esp 0x0000002d jmp 00007FBD04BA47A2h 0x0000002f setne ah 0x00000032 inc bx 0x00000034 xchg dword ptr [esp], edx 0x00000037 bt edx, edi 0x0000003a mov dl, byte ptr [esp] 0x0000003d xchg al, ah 0x0000003f jmp 00007FBD04BA481Eh 0x00000041 mov ah, DEh 0x00000043 push dword ptr [esp] 0x00000046 retn 0004h 0x00000049 push ecx 0x0000004a shl al, cl 0x0000004c jno 00007FBD04BA4863h 0x00000052 rdtsc |
Source: C:\ProgramData\javaw.exe | RDTSC instruction interceptor: First address: 45DCF2 second address: 45DD44 instructions: 0x00000000 rdtsc 0x00000002 xchg ax, dx 0x00000004 push esi 0x00000005 shr si, cl 0x00000008 jne 00007FBD04820EF1h 0x0000000a jmp 00007FBD04820F51h 0x0000000c neg dh 0x0000000e sub esp, 09h 0x00000011 mov word ptr [esp], bp 0x00000015 call 00007FBD04820F2Ch 0x0000001a not bx 0x0000001d rdtsc |
Source: C:\ProgramData\javaw.exe | RDTSC instruction interceptor: First address: 45DD44 second address: 45DFA9 instructions: 0x00000000 rdtsc 0x00000002 mov si, ax 0x00000005 mov ax, sp 0x00000008 xchg dword ptr [esp], ebx 0x0000000b jmp 00007FBD04BA47ACh 0x0000000d lea edx, dword ptr [eax+ebx] 0x00000010 mov dl, BAh 0x00000012 btc dx, bx 0x00000016 lea ebx, dword ptr [ebx+5Bh] 0x00000019 jmp 00007FBD04BA4800h 0x0000001b mov si, F9BFh 0x0000001f lea esi, dword ptr [edi+72703053h] 0x00000025 mov dl, F5h 0x00000027 bsf ax, bx 0x0000002b xchg dword ptr [esp], ebx 0x0000002e mov al, ah 0x00000030 jmp 00007FBD04BA47A5h 0x00000032 pushfd 0x00000033 mov eax, dword ptr [esp] 0x00000036 sub esp, 12h 0x00000039 lea esp, dword ptr [esp+02h] 0x0000003d push dword ptr [esp+14h] 0x00000041 retn 0018h 0x00000044 lea esp, dword ptr [esp+01h] 0x00000048 jmp 00007FBD04BA47E2h 0x0000004a bsr ebx, edx 0x0000004d jnp 00007FBD04BA49CEh 0x00000053 mov eax, 7A7AB50Dh 0x00000058 lea edx, dword ptr [00000000h+ebp*4] 0x0000005f push ecx 0x00000060 rdtsc |
Source: C:\ProgramData\javaw.exe | RDTSC instruction interceptor: First address: 4614E1 second address: 44F5A7 instructions: 0x00000000 rdtsc 0x00000002 lea ebx, dword ptr [ebx-000028E1h] 0x00000008 clc 0x00000009 jne 00007FBD04BA47B1h 0x0000000b pop edi 0x0000000c jmp 00007FBD04BA47F2h 0x0000000e mov al, dl 0x00000010 sub esp, 17h 0x00000013 jmp 00007FBD04BA48C2h 0x00000018 jp 00007FBD04BA46E4h 0x0000001e mov dx, 612Dh 0x00000022 xchg ah, bh 0x00000024 jmp 00007FBD04BA4738h 0x00000029 lea esp, dword ptr [esp+03h] 0x0000002d jmp 00007FBD04BA47A6h 0x0000002f add esp, 1Ch 0x00000032 jno 00007FBD04BA47B7h 0x00000034 pop ebp 0x00000035 inc bh 0x00000037 jmp 00007FBD04BA483Eh 0x00000039 jne 00007FBD04BA477Ch 0x0000003b shr al, 00000005h 0x0000003e bts edx, edx 0x00000041 jmp 00007FBD04BA4805h 0x00000043 pop esi 0x00000044 jmp 00007FBD04B9262Ah 0x00000049 mov ecx, ebp 0x0000004b bt ebx, edi 0x0000004e je 00007FBD04BA49F5h 0x00000054 pushad 0x00000055 jmp 00007FBD04BA4994h 0x0000005a add esp, 0Ah 0x0000005d lea esp, dword ptr [esp+02h] 0x00000061 rdtsc |
Source: C:\ProgramData\javaw.exe | RDTSC instruction interceptor: First address: 4643D2 second address: 464417 instructions: 0x00000000 rdtsc 0x00000002 mov dh, bl 0x00000004 mov dx, 8786h 0x00000008 shr eax, 00000000h 0x0000000b xchg dx, ax 0x0000000e jmp 00007FBD04820EECh 0x00000010 xchg dword ptr [esp], ebp 0x00000013 cmc 0x00000014 bsr dx, sp 0x00000018 not ah 0x0000001a bswap eax 0x0000001c bswap eax 0x0000001e jmp 00007FBD0482118Ah 0x00000023 lea ebp, dword ptr [ebp-00000021h] 0x00000029 bswap edx 0x0000002b sete al 0x0000002e stc 0x0000002f mov dx, word ptr [esp] 0x00000033 xchg dword ptr [esp], ebp 0x00000036 jmp 00007FBD04820DBEh 0x0000003b sbb eax, edx 0x0000003d mov edx, 2D87C49Bh 0x00000042 neg ax 0x00000045 bsf eax, ebp 0x00000048 sbb eax, 377E77FDh 0x0000004d push dword ptr [esp] 0x00000050 retn 0004h 0x00000053 mov al, ah 0x00000055 jmp 00007FBD04820F9Ch 0x0000005a mov dx, 1D8Dh 0x0000005e xchg dx, ax 0x00000061 xor dl, 00000062h 0x00000064 jnbe 00007FBD04820EEAh 0x00000066 xchg ah, dh 0x00000068 jmp 00007FBD04820EF8h 0x0000006a bsr dx, bx 0x0000006e lea eax, dword ptr [esp-3Bh] 0x00000072 mov ah, byte ptr [esp] 0x00000075 jmp 00007FBD04820F1Fh 0x00000077 lea edx, dword ptr [00000000h+esi*4] 0x0000007e rdtsc |
Source: C:\ProgramData\javaw.exe | RDTSC instruction interceptor: First address: 464417 second address: 4644C0 instructions: 0x00000000 rdtsc 0x00000002 rcr ah, 00000007h 0x00000005 jg 00007FBD04BA4874h 0x0000000b rdtsc |
Source: C:\ProgramData\javaw.exe | RDTSC instruction interceptor: First address: 464765 second address: 4647BF instructions: 0x00000000 rdtsc 0x00000002 mov ax, 49FAh 0x00000006 mov dh, bh 0x00000008 jmp 00007FBD04820F3Bh 0x0000000a mov al, 24h 0x0000000c xchg dx, ax 0x0000000f lea eax, dword ptr [esi-43A12DA5h] 0x00000015 rol bl, 00000000h 0x00000018 bsf ax, bx 0x0000001c jmp 00007FBD04820F3Bh 0x0000001e jnp 00007FBD04820EBDh 0x00000020 stc 0x00000021 sub esp, 1Eh 0x00000024 jmp 00007FBD04820EF4h 0x00000026 rdtsc |
Source: C:\ProgramData\javaw.exe | RDTSC instruction interceptor: First address: 468CEE second address: 468C53 instructions: 0x00000000 rdtsc 0x00000002 setl dl 0x00000005 push bx 0x00000007 jmp 00007FBD04BA472Bh 0x0000000c xchg byte ptr [esp], ah 0x0000000f rdtsc |
Source: C:\ProgramData\javaw.exe | RDTSC instruction interceptor: First address: 46421C second address: 451FCF instructions: 0x00000000 rdtsc 0x00000002 rcl bl, 00000004h 0x00000005 jns 00007FBD04821012h 0x0000000b shl ebx, cl 0x0000000d jmp 00007FBD04820FF3h 0x00000012 neg bx 0x00000015 dec ax 0x00000017 jmp 00007FBD04820F29h 0x00000019 call 00007FBD04820FD6h 0x0000001e neg al 0x00000020 jp 00007FBD04820EB6h 0x00000022 jmp 00007FBD04820EE3h 0x00000024 add esp, 04h 0x00000027 jnle 00007FBD04820EE7h 0x00000029 pop ecx 0x0000002a jmp 00007FBD0480EB93h 0x0000002f mov ecx, edi 0x00000031 xchg al, bl 0x00000033 xchg ah, dh 0x00000035 rdtsc |
Source: C:\ProgramData\javaw.exe | RDTSC instruction interceptor: First address: 4624DF second address: 4623B0 instructions: 0x00000000 rdtsc 0x00000002 setl bh 0x00000005 xor eax, eax 0x00000007 btr edx, ebx 0x0000000a jmp 00007FBD04BA46CBh 0x0000000f xchg dword ptr [esp], ebp 0x00000012 xchg dx, bx 0x00000015 sub bh, bl 0x00000017 clc 0x00000018 mov bh, 48h 0x0000001a xchg ebx, edx 0x0000001c jmp 00007FBD04BA4799h 0x0000001e lea ebp, dword ptr [ebp+00000197h] 0x00000024 bsf eax, edi 0x00000027 sub esp, 11h 0x0000002a and edx, ebp 0x0000002c xchg byte ptr [esp+0Ch], dl 0x00000030 sub esp, 0Eh 0x00000033 jmp 00007FBD04BA47A5h 0x00000035 lea esp, dword ptr [esp+03h] 0x00000039 xchg dword ptr [esp+1Ch], ebp 0x0000003d mov bx, ax 0x00000040 cmc 0x00000041 rdtsc |
Source: C:\ProgramData\javaw.exe | RDTSC instruction interceptor: First address: 4623B0 second address: 462465 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBD04820F88h 0x00000004 rcr eax, 08h 0x00000007 push dword ptr [esp+1Ch] 0x0000000b retn 0020h 0x0000000e push ebp 0x0000000f mov bl, cl 0x00000011 bsf bp, ax 0x00000015 jns 00007FBD04820DF3h 0x0000001b call 00007FBD04820F81h 0x00000020 pushad 0x00000021 not dh 0x00000023 not bl 0x00000025 bsf edx, ebp 0x00000028 xchg dword ptr [esp+20h], ebx 0x0000002c jmp 00007FBD04820ED4h 0x0000002e btc ebp, edx 0x00000031 mov eax, ecx 0x00000033 shl eax, cl 0x00000035 mov edx, dword ptr [esp] 0x00000038 xchg eax, ebp 0x00000039 lea ebx, dword ptr [ebx-0000001Bh] 0x0000003f jmp 00007FBD04820EE9h 0x00000041 xchg ah, al 0x00000043 mov dl, 36h 0x00000045 xchg dl, dh 0x00000047 push bx 0x00000049 xchg bp, dx 0x0000004c lea esp, dword ptr [esp+02h] 0x00000050 jmp 00007FBD04820F2Ah 0x00000052 xchg dword ptr [esp+20h], ebx 0x00000056 mov bh, byte ptr [esp] 0x00000059 clc 0x0000005a rdtsc |
Source: C:\ProgramData\javaw.exe | RDTSC instruction interceptor: First address: 45DD44 second address: 45DFA9 instructions: 0x00000000 rdtsc 0x00000002 mov si, ax 0x00000005 mov ax, sp 0x00000008 xchg dword ptr [esp], ebx 0x0000000b jmp 00007FBD04820EECh 0x0000000d lea edx, dword ptr [eax+ebx] 0x00000010 mov dl, BAh 0x00000012 btc dx, bx 0x00000016 lea ebx, dword ptr [ebx+5Bh] 0x00000019 jmp 00007FBD04820F40h 0x0000001b mov si, F9BFh 0x0000001f lea esi, dword ptr [edi+72703053h] 0x00000025 mov dl, F5h 0x00000027 bsf ax, bx 0x0000002b xchg dword ptr [esp], ebx 0x0000002e mov al, ah 0x00000030 jmp 00007FBD04820EE5h 0x00000032 pushfd 0x00000033 mov eax, dword ptr [esp] 0x00000036 sub esp, 12h 0x00000039 lea esp, dword ptr [esp+02h] 0x0000003d push dword ptr [esp+14h] 0x00000041 retn 0018h 0x00000044 lea esp, dword ptr [esp+01h] 0x00000048 jmp 00007FBD04820F22h 0x0000004a bsr ebx, edx 0x0000004d jnp 00007FBD0482110Eh 0x00000053 mov eax, 7A7AB50Dh 0x00000058 jmp 00007FBD04820F68h 0x0000005a lea edx, dword ptr [00000000h+ebp*4] 0x00000061 jmp 00007FBD048210B0h 0x00000066 push ecx 0x00000067 rdtsc |
Source: C:\ProgramData\javaw.exe | RDTSC instruction interceptor: First address: 46421C second address: 451FCF instructions: 0x00000000 rdtsc 0x00000002 rcl bl, 00000004h 0x00000005 jns 00007FBD04BA48D2h 0x0000000b shl ebx, cl 0x0000000d jmp 00007FBD04BA48B3h 0x00000012 neg bx 0x00000015 dec ax 0x00000017 jmp 00007FBD04BA47E9h 0x00000019 call 00007FBD04BA4896h 0x0000001e neg al 0x00000020 jp 00007FBD04BA4776h 0x00000022 jmp 00007FBD04BA47A3h 0x00000024 add esp, 04h 0x00000027 jnle 00007FBD04BA47A7h 0x00000029 pop ecx 0x0000002a jmp 00007FBD04B92453h 0x0000002f mov ecx, edi 0x00000031 xchg al, bl 0x00000033 xchg ah, dh 0x00000035 rdtsc |
Source: C:\ProgramData\javaw.exe | RDTSC instruction interceptor: First address: 46E50D second address: 46E513 instructions: 0x00000000 rdtsc 0x00000002 xchg dl, dh 0x00000004 jmp 00007FBD04BA4815h 0x00000006 ror bl, 00000000h 0x00000009 neg eax 0x0000000b jnle 00007FBD04BA4788h 0x0000000d rdtsc |
Source: C:\ProgramData\javaw.exe | RDTSC instruction interceptor: First address: 44F55C second address: 44F6CE instructions: 0x00000000 rdtsc 0x00000002 mov ebx, 4A18971Dh 0x00000007 xchg bx, ax 0x0000000a xor ah, ah 0x0000000c jmp 00007FBD04BA4848h 0x0000000e shr dh, 00000006h 0x00000011 jmp 00007FBD04BA47B7h 0x00000013 ror ebp, 00000000h 0x00000016 mov bx, 258Eh 0x0000001a or ebx, ebx 0x0000001c jc 00007FBD04BA48E6h 0x00000022 jnc 00007FBD04BA485Bh 0x00000028 not bx 0x0000002b lea ebx, dword ptr [00000000h+esi*4] 0x00000032 inc bl 0x00000034 jmp 00007FBD04BA4855h 0x00000039 jmp 00007FBD04BA4700h 0x0000003e xor ebp, 4F446086h 0x00000044 shr ebx, cl 0x00000046 jbe 00007FBD04BA47B2h 0x00000048 mov dl, byte ptr [esp] 0x0000004b jmp 00007FBD04BA47D6h 0x0000004d bswap eax 0x0000004f mov bh, byte ptr [esp] 0x00000052 mov bx, bp 0x00000055 jmp 00007FBD04BA47D6h 0x00000057 bts ebx, edi 0x0000005a call 00007FBD04BA4812h 0x0000005f sub esp, 0Dh 0x00000062 not ebx 0x00000064 mov bx, word ptr [esp+08h] 0x00000069 lea esp, dword ptr [esp+01h] 0x0000006d xchg dword ptr [esp+0Ch], ebp 0x00000071 jmp 00007FBD04BA47A8h 0x00000073 lea eax, dword ptr [00000000h+ecx*4] 0x0000007a setnl ah 0x0000007d call 00007FBD04BA47F0h 0x00000082 call 00007FBD04BA47FCh 0x00000087 lea ebp, dword ptr [ebp+67h] 0x0000008a rdtsc |
Source: C:\ProgramData\javaw.exe | RDTSC instruction interceptor: First address: 49872D second address: 4987EF instructions: 0x00000000 rdtsc 0x00000002 not dl 0x00000004 not bl 0x00000006 jmp 00007FBD04BA4788h 0x00000008 xchg dword ptr [esp], edx 0x0000000b mov bx, word ptr [esp] 0x0000000f xchg ah, bh 0x00000011 lea edx, dword ptr [edx-00000118h] 0x00000017 bsr eax, eax 0x0000001a lea eax, dword ptr [00000000h+ebx*4] 0x00000021 jmp 00007FBD04BA47A1h 0x00000023 inc bh 0x00000025 mov al, bl 0x00000027 xchg dword ptr [esp], edx 0x0000002a bsf eax, eax 0x0000002d setp al 0x00000030 rcr al, 00000002h 0x00000033 jmp 00007FBD04BA47F1h 0x00000035 neg dx 0x00000038 push dword ptr [esp] 0x0000003b retn 0004h 0x0000003e sub esi, 02h 0x00000041 mov dh, dl 0x00000043 mov ax, word ptr [esp] 0x00000047 rdtsc |
Source: C:\ProgramData\javaw.exe | RDTSC instruction interceptor: First address: 49788F second address: 49790A instructions: 0x00000000 rdtsc 0x00000002 mov bx, word ptr [esp] 0x00000006 jmp 00007FBD04820F82h 0x00000008 mov ebx, dword ptr [edi] 0x0000000a push esi 0x0000000b rdtsc |
Source: C:\ProgramData\javaw.exe | RDTSC instruction interceptor: First address: 49790A second address: 4979E5 instructions: 0x00000000 rdtsc 0x00000002 mov dl, byte ptr [edi+04h] 0x00000005 jmp 00007FBD04BA4786h 0x00000007 bts eax, esi 0x0000000a jle 00007FBD04BA47A8h 0x0000000c lea eax, dword ptr [CE4B721Bh] 0x00000012 lea eax, dword ptr [00000000h+ebp*4] 0x00000019 jmp 00007FBD04BA47D6h 0x0000001b sub edi, 02h 0x0000001e mov ah, bh 0x00000020 not al 0x00000022 mov al, byte ptr [esp] 0x00000025 cmc 0x00000026 jmp 00007FBD04BA47D6h 0x00000028 jne 00007FBD04BA4791h 0x0000002a xchg edx, ecx 0x0000002c mov ax, bx 0x0000002f mov ax, 0B8Eh 0x00000033 jmp 00007FBD04BA483Fh 0x00000035 rol ebx, cl 0x00000037 setnp ah 0x0000003a not al 0x0000003c mov ax, dx 0x0000003f jmp 00007FBD04BA47B0h 0x00000041 xchg edx, ecx 0x00000043 lea eax, dword ptr [ebp-0000CD0Bh] 0x00000049 bswap eax 0x0000004b mov ax, word ptr [esp] 0x0000004f jmp 00007FBD04BA488Dh 0x00000054 mov dword ptr [edi+04h], ebx 0x00000057 lea ebx, dword ptr [6C50EA05h] 0x0000005d rdtsc |
Source: C:\ProgramData\javaw.exe | RDTSC instruction interceptor: First address: 49C124 second address: 49BFCE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBD04820DB5h 0x00000007 xchg dword ptr [esp], edi 0x0000000a rdtsc |
Source: C:\ProgramData\javaw.exe | RDTSC instruction interceptor: First address: 49C9DC second address: 49CA5F instructions: 0x00000000 rdtsc 0x00000002 setnl al 0x00000005 not dh 0x00000007 jmp 00007FBD04BA47A3h 0x00000009 lea edx, dword ptr [edi+ebp] 0x0000000c dec ebp 0x0000000d mov ax, 64B7h 0x00000011 mov dx, 7257h 0x00000015 mov dh, byte ptr [esp] 0x00000018 jmp 00007FBD04BA4868h 0x0000001d mov eax, ebx 0x0000001f rdtsc |
Source: C:\ProgramData\javaw.exe | RDTSC instruction interceptor: First address: 475F3F second address: 460A8B instructions: 0x00000000 rdtsc 0x00000002 call 00007FBD04820F2Ch 0x00000007 pop word ptr [esp] 0x0000000b push word ptr [esp] 0x0000000f js 00007FBD04820EF1h 0x00000011 jns 00007FBD04820F30h 0x00000013 sub esi, 08h 0x00000016 cmc 0x00000017 jns 00007FBD04820EEEh 0x00000019 sub esp, 0Fh 0x0000001c jmp 00007FBD04820F6Fh 0x0000001e lea esp, dword ptr [esp] 0x00000021 mov byte ptr [esp+06h], cl 0x00000025 lea esp, dword ptr [esp+03h] 0x00000029 jmp 00007FBD04820EA8h 0x0000002b mov dword ptr [esi], edx 0x0000002d lea edx, dword ptr [ebx+ebp] 0x00000030 bswap edx 0x00000032 jmp 00007FBD04820F50h 0x00000034 xchg eax, ebx 0x00000035 clc 0x00000036 jnl 00007FBD04820F47h 0x00000038 mov dx, bp 0x0000003b jmp 00007FBD04820EF7h 0x0000003d xchg dh, dl 0x0000003f sete dl 0x00000042 jmp 00007FBD04820F26h 0x00000044 mov dword ptr [esi+04h], ebx 0x00000047 sub esp, 11h 0x0000004a jmp 00007FBD04820F72h 0x0000004c jnle 00007FBD04820EB4h 0x0000004e mov edx, 5FBC1226h 0x00000053 mov edx, ebx 0x00000055 lea esp, dword ptr [esp+01h] 0x00000059 jmp 00007FBD0480B96Ch 0x0000005e neg bx 0x00000061 jp 00007FBD04820EF7h 0x00000063 mov eax, esp 0x00000065 jmp 00007FBD04820F2Ch 0x00000067 mov ah, 02h 0x00000069 rdtsc |
Source: C:\ProgramData\javaw.exe | RDTSC instruction interceptor: First address: 47A373 second address: 47A3B6 instructions: 0x00000000 rdtsc 0x00000002 mov ah, dl 0x00000004 xchg dword ptr [esp], eax 0x00000007 bswap edx 0x00000009 jmp 00007FBD04BA4812h 0x0000000b bsr dx, dx 0x0000000f mov dx, word ptr [esp] 0x00000013 neg dx 0x00000016 lea eax, dword ptr [eax-000000C3h] 0x0000001c lea edx, dword ptr [00000000h+edx*4] 0x00000023 pushfd 0x00000024 jmp 00007FBD04BA47A1h 0x00000026 lea edx, dword ptr [esi+2152D358h] 0x0000002c mov dl, byte ptr [esp+03h] 0x00000030 xchg dword ptr [esp+04h], eax 0x00000034 rdtsc |
Source: C:\ProgramData\javaw.exe | RDTSC instruction interceptor: First address: 49F168 second address: 45D990 instructions: 0x00000000 rdtsc 0x00000002 cmc 0x00000003 jc 00007FBD04820EF7h 0x00000005 clc 0x00000006 jmp 00007FBD04820F16h 0x00000008 sub edi, 08h 0x0000000b push bx 0x0000000d lea esp, dword ptr [esp+02h] 0x00000011 call 00007FBD04820F88h 0x00000016 xchg dword ptr [esp], edi 0x00000019 sub esp, 1Ch 0x0000001c mov byte ptr [esp+0Eh], cl 0x00000020 cmc 0x00000021 lea edi, dword ptr [edi+000000C5h] 0x00000027 jmp 00007FBD04820ECBh 0x00000029 sub esp, 05h 0x0000002c pop word ptr [esp] 0x00000030 lea esp, dword ptr [esp+03h] 0x00000034 xchg dword ptr [esp+1Ch], edi 0x00000038 call 00007FBD04820EE2h 0x0000003d call 00007FBD04820EFAh 0x00000042 push dword ptr [esp+24h] 0x00000046 retn 0028h 0x00000049 xchg edx, ebx 0x0000004b jmp 00007FBD04820E6Eh 0x00000050 mov dword ptr [edi], ebx 0x00000052 call 00007FBD04820F3Ch 0x00000057 lea esp, dword ptr [esp+03h] 0x0000005b mov bh, byte ptr [esp] 0x0000005e setnb bh 0x00000061 lea esp, dword ptr [esp+01h] 0x00000065 jmp 00007FBD04820F4Bh 0x00000067 mov dword ptr [edi+04h], eax 0x0000006a setl ah 0x0000006d mov bx, word ptr [esp] 0x00000071 dec ax 0x00000073 jp 00007FBD04820EEEh 0x00000075 mov ah, byte ptr [esp] 0x00000078 jmp 00007FBD047DF5F5h 0x0000007d jmp 00007FBD04820F5Fh 0x0000007f mov bh, byte ptr [esp] 0x00000082 mov ax, si 0x00000085 lea eax, dword ptr [ebp-6656654Ch] 0x0000008b not dx 0x0000008e lea ebx, dword ptr [esi+50h] 0x00000091 jmp 00007FBD04820EE7h 0x00000093 shl eax, cl 0x00000095 jle 00007FBD04820F4Fh 0x00000097 lea edx, dword ptr [ecx+ebx] 0x0000009a rdtsc |
Source: C:\ProgramData\javaw.exe | RDTSC instruction interceptor: First address: 44F602 second address: 44F5C1 instructions: 0x00000000 rdtsc 0x00000002 xchg ax, bx 0x00000004 mov dx, word ptr [esp] 0x00000008 jmp 00007FBD04820D20h 0x0000000d mov edx, 8724C233h 0x00000012 sub esp, 1Ah 0x00000015 jno 00007FBD04820F77h 0x00000017 mov edx, ecx 0x00000019 mov dx, word ptr [esp] 0x0000001d lea esp, dword ptr [esp+02h] 0x00000021 lea esp, dword ptr [esp+18h] 0x00000025 neg ebp 0x00000027 mov bx, ax 0x0000002a mov dh, 56h 0x0000002c jmp 00007FBD04820FBBh 0x00000031 sub esp, 10h 0x00000034 jnc 00007FBD04820EF7h 0x00000036 bswap edx 0x00000038 lea esp, dword ptr [esp+07h] 0x0000003c jmp 00007FBD04820F47h 0x0000003e pop eax 0x0000003f call 00007FBD04820F25h 0x00000044 lea esp, dword ptr [esp+01h] 0x00000048 lea esp, dword ptr [esp+08h] 0x0000004c xor ebp, 19DD69F3h 0x00000052 jmp 00007FBD04820ED3h 0x00000054 neg ax 0x00000057 jl 00007FBD04820F77h 0x00000059 rdtsc |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02307229 mov eax, dword ptr fs:[00000030h] | 0_2_02307229 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02307229 mov eax, dword ptr fs:[00000030h] | 0_2_02307229 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0233C299 mov eax, dword ptr fs:[00000030h] | 0_2_0233C299 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0233C299 mov eax, dword ptr fs:[00000030h] | 0_2_0233C299 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0233C299 mov eax, dword ptr fs:[00000030h] | 0_2_0233C299 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0231A29B mov eax, dword ptr fs:[00000030h] | 0_2_0231A29B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_022E8297 mov eax, dword ptr fs:[00000030h] | 0_2_022E8297 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_022E8297 mov eax, dword ptr fs:[00000030h] | 0_2_022E8297 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0231A2FB mov eax, dword ptr fs:[00000030h] | 0_2_0231A2FB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0231A2FB mov eax, dword ptr fs:[00000030h] | 0_2_0231A2FB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0230C31B mov eax, dword ptr fs:[00000030h] | 0_2_0230C31B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0230C31B mov eax, dword ptr fs:[00000030h] | 0_2_0230C31B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0230C31B mov ecx, dword ptr fs:[00000030h] | 0_2_0230C31B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0230C31B mov eax, dword ptr fs:[00000030h] | 0_2_0230C31B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0230C31B mov eax, dword ptr fs:[00000030h] | 0_2_0230C31B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0230C31B mov eax, dword ptr fs:[00000030h] | 0_2_0230C31B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0230C31B mov eax, dword ptr fs:[00000030h] | 0_2_0230C31B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_022D8362 mov eax, dword ptr fs:[00000030h] | 0_2_022D8362 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_022D8362 mov ecx, dword ptr fs:[00000030h] | 0_2_022D8362 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0231B35B mov eax, dword ptr fs:[00000030h] | 0_2_0231B35B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0231B3BB mov eax, dword ptr fs:[00000030h] | 0_2_0231B3BB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0231B3BB mov eax, dword ptr fs:[00000030h] | 0_2_0231B3BB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_023073AB mov eax, dword ptr fs:[00000030h] | 0_2_023073AB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_023073AB mov eax, dword ptr fs:[00000030h] | 0_2_023073AB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_023073AB mov eax, dword ptr fs:[00000030h] | 0_2_023073AB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_023073AB mov eax, dword ptr fs:[00000030h] | 0_2_023073AB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_023063FE mov ecx, dword ptr fs:[00000030h] | 0_2_023063FE |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_023063FE mov eax, dword ptr fs:[00000030h] | 0_2_023063FE |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0231A3E9 mov eax, dword ptr fs:[00000030h] | 0_2_0231A3E9 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0231A3E9 mov eax, dword ptr fs:[00000030h] | 0_2_0231A3E9 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_023383ED mov eax, dword ptr fs:[00000030h] | 0_2_023383ED |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_023383ED mov eax, dword ptr fs:[00000030h] | 0_2_023383ED |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_023203DB mov eax, dword ptr fs:[00000030h] | 0_2_023203DB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_023203DB mov eax, dword ptr fs:[00000030h] | 0_2_023203DB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0233B013 mov eax, dword ptr fs:[00000030h] | 0_2_0233B013 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0233B013 mov eax, dword ptr fs:[00000030h] | 0_2_0233B013 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02327004 mov eax, dword ptr fs:[00000030h] | 0_2_02327004 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02327004 mov eax, dword ptr fs:[00000030h] | 0_2_02327004 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02327004 mov eax, dword ptr fs:[00000030h] | 0_2_02327004 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02327004 mov eax, dword ptr fs:[00000030h] | 0_2_02327004 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02327004 mov ecx, dword ptr fs:[00000030h] | 0_2_02327004 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02338004 mov eax, dword ptr fs:[00000030h] | 0_2_02338004 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0230007A mov ecx, dword ptr fs:[00000030h] | 0_2_0230007A |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0230007A mov eax, dword ptr fs:[00000030h] | 0_2_0230007A |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0233207E mov eax, dword ptr fs:[00000030h] | 0_2_0233207E |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0233207E mov eax, dword ptr fs:[00000030h] | 0_2_0233207E |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0231B06B mov eax, dword ptr fs:[00000030h] | 0_2_0231B06B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0231B06B mov eax, dword ptr fs:[00000030h] | 0_2_0231B06B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0231F04D mov eax, dword ptr fs:[00000030h] | 0_2_0231F04D |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0231F04D mov eax, dword ptr fs:[00000030h] | 0_2_0231F04D |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0231F04D mov eax, dword ptr fs:[00000030h] | 0_2_0231F04D |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0230D0B2 mov eax, dword ptr fs:[00000030h] | 0_2_0230D0B2 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0233C0FF mov eax, dword ptr fs:[00000030h] | 0_2_0233C0FF |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0230C0DB mov eax, dword ptr fs:[00000030h] | 0_2_0230C0DB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0230C0DB mov eax, dword ptr fs:[00000030h] | 0_2_0230C0DB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0230C0DB mov eax, dword ptr fs:[00000030h] | 0_2_0230C0DB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0230C0DB mov eax, dword ptr fs:[00000030h] | 0_2_0230C0DB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0231E137 mov ecx, dword ptr fs:[00000030h] | 0_2_0231E137 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02333121 mov eax, dword ptr fs:[00000030h] | 0_2_02333121 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02333121 mov eax, dword ptr fs:[00000030h] | 0_2_02333121 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02333121 mov eax, dword ptr fs:[00000030h] | 0_2_02333121 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0232F169 mov eax, dword ptr fs:[00000030h] | 0_2_0232F169 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0232F169 mov eax, dword ptr fs:[00000030h] | 0_2_0232F169 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0232F169 mov eax, dword ptr fs:[00000030h] | 0_2_0232F169 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0232F169 mov ecx, dword ptr fs:[00000030h] | 0_2_0232F169 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0232F169 mov eax, dword ptr fs:[00000030h] | 0_2_0232F169 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0232F169 mov ecx, dword ptr fs:[00000030h] | 0_2_0232F169 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0233215D mov eax, dword ptr fs:[00000030h] | 0_2_0233215D |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0233215D mov eax, dword ptr fs:[00000030h] | 0_2_0233215D |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0232014F mov eax, dword ptr fs:[00000030h] | 0_2_0232014F |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_022DD153 mov eax, dword ptr fs:[00000030h] | 0_2_022DD153 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0230A1BB mov eax, dword ptr fs:[00000030h] | 0_2_0230A1BB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0230A1BB mov ecx, dword ptr fs:[00000030h] | 0_2_0230A1BB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02338195 mov eax, dword ptr fs:[00000030h] | 0_2_02338195 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02338195 mov eax, dword ptr fs:[00000030h] | 0_2_02338195 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0233B19C mov eax, dword ptr fs:[00000030h] | 0_2_0233B19C |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0233B19C mov eax, dword ptr fs:[00000030h] | 0_2_0233B19C |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_023241CB mov eax, dword ptr fs:[00000030h] | 0_2_023241CB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_023241CB mov ecx, dword ptr fs:[00000030h] | 0_2_023241CB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0233C1CC mov eax, dword ptr fs:[00000030h] | 0_2_0233C1CC |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_022F863C mov eax, dword ptr fs:[00000030h] | 0_2_022F863C |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_022F863C mov eax, dword ptr fs:[00000030h] | 0_2_022F863C |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_022F863C mov eax, dword ptr fs:[00000030h] | 0_2_022F863C |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0232662F mov eax, dword ptr fs:[00000030h] | 0_2_0232662F |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0232662F mov eax, dword ptr fs:[00000030h] | 0_2_0232662F |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0232662F mov eax, dword ptr fs:[00000030h] | 0_2_0232662F |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0232662F mov eax, dword ptr fs:[00000030h] | 0_2_0232662F |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0232662F mov ecx, dword ptr fs:[00000030h] | 0_2_0232662F |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_023076BA mov eax, dword ptr fs:[00000030h] | 0_2_023076BA |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_023076BA mov eax, dword ptr fs:[00000030h] | 0_2_023076BA |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_023076BA mov eax, dword ptr fs:[00000030h] | 0_2_023076BA |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_023076BA mov eax, dword ptr fs:[00000030h] | 0_2_023076BA |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_023316BC mov eax, dword ptr fs:[00000030h] | 0_2_023316BC |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_023246E5 mov eax, dword ptr fs:[00000030h] | 0_2_023246E5 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_023246E5 mov eax, dword ptr fs:[00000030h] | 0_2_023246E5 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_023246E5 mov eax, dword ptr fs:[00000030h] | 0_2_023246E5 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_023246E5 mov eax, dword ptr fs:[00000030h] | 0_2_023246E5 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_023246E5 mov ecx, dword ptr fs:[00000030h] | 0_2_023246E5 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0232873B mov eax, dword ptr fs:[00000030h] | 0_2_0232873B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02307722 mov eax, dword ptr fs:[00000030h] | 0_2_02307722 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02307722 mov eax, dword ptr fs:[00000030h] | 0_2_02307722 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0232F725 mov eax, dword ptr fs:[00000030h] | 0_2_0232F725 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0231F71B mov eax, dword ptr fs:[00000030h] | 0_2_0231F71B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0231F71B mov ecx, dword ptr fs:[00000030h] | 0_2_0231F71B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0233670A mov eax, dword ptr fs:[00000030h] | 0_2_0233670A |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0231E761 mov eax, dword ptr fs:[00000030h] | 0_2_0231E761 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0231E761 mov eax, dword ptr fs:[00000030h] | 0_2_0231E761 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0231E761 mov eax, dword ptr fs:[00000030h] | 0_2_0231E761 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02307768 mov eax, dword ptr fs:[00000030h] | 0_2_02307768 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02307768 mov eax, dword ptr fs:[00000030h] | 0_2_02307768 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02307768 mov ecx, dword ptr fs:[00000030h] | 0_2_02307768 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0232376F mov eax, dword ptr fs:[00000030h] | 0_2_0232376F |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0232376F mov eax, dword ptr fs:[00000030h] | 0_2_0232376F |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0232376F mov eax, dword ptr fs:[00000030h] | 0_2_0232376F |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0232376F mov eax, dword ptr fs:[00000030h] | 0_2_0232376F |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0232376F mov eax, dword ptr fs:[00000030h] | 0_2_0232376F |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0232376F mov eax, dword ptr fs:[00000030h] | 0_2_0232376F |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0232376F mov ecx, dword ptr fs:[00000030h] | 0_2_0232376F |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0232376F mov eax, dword ptr fs:[00000030h] | 0_2_0232376F |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0231A76F mov eax, dword ptr fs:[00000030h] | 0_2_0231A76F |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0231A76F mov ecx, dword ptr fs:[00000030h] | 0_2_0231A76F |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_022FE759 mov eax, dword ptr fs:[00000030h] | 0_2_022FE759 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02302748 mov eax, dword ptr fs:[00000030h] | 0_2_02302748 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_022DC7AC mov eax, dword ptr fs:[00000030h] | 0_2_022DC7AC |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_022DC7AC mov eax, dword ptr fs:[00000030h] | 0_2_022DC7AC |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_022DC7AC mov eax, dword ptr fs:[00000030h] | 0_2_022DC7AC |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_022F97AB mov eax, dword ptr fs:[00000030h] | 0_2_022F97AB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_022F97AB mov eax, dword ptr fs:[00000030h] | 0_2_022F97AB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_022F97AB mov eax, dword ptr fs:[00000030h] | 0_2_022F97AB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_022E778B mov ecx, dword ptr fs:[00000030h] | 0_2_022E778B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02331796 mov eax, dword ptr fs:[00000030h] | 0_2_02331796 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0230C787 mov eax, dword ptr fs:[00000030h] | 0_2_0230C787 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0230C787 mov eax, dword ptr fs:[00000030h] | 0_2_0230C787 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_022E07E7 mov eax, dword ptr fs:[00000030h] | 0_2_022E07E7 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_022E07E7 mov ecx, dword ptr fs:[00000030h] | 0_2_022E07E7 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0231E7EC mov eax, dword ptr fs:[00000030h] | 0_2_0231E7EC |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0230F7EE mov eax, dword ptr fs:[00000030h] | 0_2_0230F7EE |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0230F7EE mov eax, dword ptr fs:[00000030h] | 0_2_0230F7EE |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0233A42A mov eax, dword ptr fs:[00000030h] | 0_2_0233A42A |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0233A42A mov ecx, dword ptr fs:[00000030h] | 0_2_0233A42A |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0232641B mov eax, dword ptr fs:[00000030h] | 0_2_0232641B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0232641B mov ecx, dword ptr fs:[00000030h] | 0_2_0232641B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0231F477 mov eax, dword ptr fs:[00000030h] | 0_2_0231F477 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0231F477 mov eax, dword ptr fs:[00000030h] | 0_2_0231F477 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0231B4BB mov eax, dword ptr fs:[00000030h] | 0_2_0231B4BB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0233248B mov eax, dword ptr fs:[00000030h] | 0_2_0233248B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_022DB4E2 mov eax, dword ptr fs:[00000030h] | 0_2_022DB4E2 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0231C4E6 mov eax, dword ptr fs:[00000030h] | 0_2_0231C4E6 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_023324CF mov eax, dword ptr fs:[00000030h] | 0_2_023324CF |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_023324CF mov eax, dword ptr fs:[00000030h] | 0_2_023324CF |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0232653B mov eax, dword ptr fs:[00000030h] | 0_2_0232653B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_022E053C mov esi, dword ptr fs:[00000030h] | 0_2_022E053C |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0231B51B mov eax, dword ptr fs:[00000030h] | 0_2_0231B51B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0231B51B mov eax, dword ptr fs:[00000030h] | 0_2_0231B51B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0231B51B mov eax, dword ptr fs:[00000030h] | 0_2_0231B51B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0231B51B mov eax, dword ptr fs:[00000030h] | 0_2_0231B51B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0231B51B mov eax, dword ptr fs:[00000030h] | 0_2_0231B51B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0231B51B mov eax, dword ptr fs:[00000030h] | 0_2_0231B51B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0231B51B mov eax, dword ptr fs:[00000030h] | 0_2_0231B51B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0231B51B mov eax, dword ptr fs:[00000030h] | 0_2_0231B51B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0231B51B mov eax, dword ptr fs:[00000030h] | 0_2_0231B51B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0231B51B mov eax, dword ptr fs:[00000030h] | 0_2_0231B51B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02331574 mov eax, dword ptr fs:[00000030h] | 0_2_02331574 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02331574 mov eax, dword ptr fs:[00000030h] | 0_2_02331574 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02331574 mov eax, dword ptr fs:[00000030h] | 0_2_02331574 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_022DB561 mov eax, dword ptr fs:[00000030h] | 0_2_022DB561 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_022DB561 mov eax, dword ptr fs:[00000030h] | 0_2_022DB561 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_022DB57B mov eax, dword ptr fs:[00000030h] | 0_2_022DB57B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_022DB57B mov eax, dword ptr fs:[00000030h] | 0_2_022DB57B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0231A569 mov eax, dword ptr fs:[00000030h] | 0_2_0231A569 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0231A569 mov ecx, dword ptr fs:[00000030h] | 0_2_0231A569 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0232F555 mov eax, dword ptr fs:[00000030h] | 0_2_0232F555 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0232F555 mov eax, dword ptr fs:[00000030h] | 0_2_0232F555 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0232F555 mov eax, dword ptr fs:[00000030h] | 0_2_0232F555 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0231C54C mov eax, dword ptr fs:[00000030h] | 0_2_0231C54C |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_023065A2 mov ecx, dword ptr fs:[00000030h] | 0_2_023065A2 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_023065A2 mov eax, dword ptr fs:[00000030h] | 0_2_023065A2 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0232158B mov ecx, dword ptr fs:[00000030h] | 0_2_0232158B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_023315E2 mov eax, dword ptr fs:[00000030h] | 0_2_023315E2 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0230C5EB mov eax, dword ptr fs:[00000030h] | 0_2_0230C5EB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0230C5EB mov eax, dword ptr fs:[00000030h] | 0_2_0230C5EB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0230C5EB mov eax, dword ptr fs:[00000030h] | 0_2_0230C5EB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0230C5EB mov eax, dword ptr fs:[00000030h] | 0_2_0230C5EB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0230E5C9 mov eax, dword ptr fs:[00000030h] | 0_2_0230E5C9 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0230E5C9 mov eax, dword ptr fs:[00000030h] | 0_2_0230E5C9 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_022F9A1B mov eax, dword ptr fs:[00000030h] | 0_2_022F9A1B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_022F9A1B mov ecx, dword ptr fs:[00000030h] | 0_2_022F9A1B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_022F9A1B mov eax, dword ptr fs:[00000030h] | 0_2_022F9A1B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02331A05 mov eax, dword ptr fs:[00000030h] | 0_2_02331A05 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02318A71 mov eax, dword ptr fs:[00000030h] | 0_2_02318A71 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02319A48 mov eax, dword ptr fs:[00000030h] | 0_2_02319A48 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02319A48 mov eax, dword ptr fs:[00000030h] | 0_2_02319A48 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0231AA4F mov eax, dword ptr fs:[00000030h] | 0_2_0231AA4F |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_022DFABB mov eax, dword ptr fs:[00000030h] | 0_2_022DFABB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_022DFABB mov ecx, dword ptr fs:[00000030h] | 0_2_022DFABB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0233AAAA mov eax, dword ptr fs:[00000030h] | 0_2_0233AAAA |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0233AAAA mov eax, dword ptr fs:[00000030h] | 0_2_0233AAAA |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0231FAEB mov eax, dword ptr fs:[00000030h] | 0_2_0231FAEB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0231FAEB mov ecx, dword ptr fs:[00000030h] | 0_2_0231FAEB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_022E7AD8 mov eax, dword ptr fs:[00000030h] | 0_2_022E7AD8 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_022E7AD8 mov ecx, dword ptr fs:[00000030h] | 0_2_022E7AD8 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_022E7AD8 mov eax, dword ptr fs:[00000030h] | 0_2_022E7AD8 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0233BB3E mov eax, dword ptr fs:[00000030h] | 0_2_0233BB3E |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0233BB3E mov eax, dword ptr fs:[00000030h] | 0_2_0233BB3E |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0231AB2D mov eax, dword ptr fs:[00000030h] | 0_2_0231AB2D |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0231AB2D mov eax, dword ptr fs:[00000030h] | 0_2_0231AB2D |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02318B10 mov eax, dword ptr fs:[00000030h] | 0_2_02318B10 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02318B10 mov ecx, dword ptr fs:[00000030h] | 0_2_02318B10 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02337B1F mov eax, dword ptr fs:[00000030h] | 0_2_02337B1F |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02337B1F mov eax, dword ptr fs:[00000030h] | 0_2_02337B1F |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02337B1F mov eax, dword ptr fs:[00000030h] | 0_2_02337B1F |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02337B1F mov eax, dword ptr fs:[00000030h] | 0_2_02337B1F |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02327B0A mov eax, dword ptr fs:[00000030h] | 0_2_02327B0A |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02328B5B mov eax, dword ptr fs:[00000030h] | 0_2_02328B5B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02314B4F mov eax, dword ptr fs:[00000030h] | 0_2_02314B4F |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02314B4F mov ecx, dword ptr fs:[00000030h] | 0_2_02314B4F |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_022E6BB6 mov eax, dword ptr fs:[00000030h] | 0_2_022E6BB6 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02302BA9 mov eax, dword ptr fs:[00000030h] | 0_2_02302BA9 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02302BA9 mov eax, dword ptr fs:[00000030h] | 0_2_02302BA9 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02318BFC mov eax, dword ptr fs:[00000030h] | 0_2_02318BFC |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02318BFC mov eax, dword ptr fs:[00000030h] | 0_2_02318BFC |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_022D8BC9 mov eax, dword ptr fs:[00000030h] | 0_2_022D8BC9 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02323BDB mov ecx, dword ptr fs:[00000030h] | 0_2_02323BDB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02310BDB mov eax, dword ptr fs:[00000030h] | 0_2_02310BDB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0230BBDB mov eax, dword ptr fs:[00000030h] | 0_2_0230BBDB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0230BBDB mov eax, dword ptr fs:[00000030h] | 0_2_0230BBDB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02331BC3 mov eax, dword ptr fs:[00000030h] | 0_2_02331BC3 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02331BC3 mov eax, dword ptr fs:[00000030h] | 0_2_02331BC3 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0230283B mov eax, dword ptr fs:[00000030h] | 0_2_0230283B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0230283B mov eax, dword ptr fs:[00000030h] | 0_2_0230283B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0231A81B mov eax, dword ptr fs:[00000030h] | 0_2_0231A81B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0231A81B mov eax, dword ptr fs:[00000030h] | 0_2_0231A81B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0231A81B mov eax, dword ptr fs:[00000030h] | 0_2_0231A81B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0231A81B mov ecx, dword ptr fs:[00000030h] | 0_2_0231A81B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02336873 mov eax, dword ptr fs:[00000030h] | 0_2_02336873 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0232F874 mov eax, dword ptr fs:[00000030h] | 0_2_0232F874 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_022FE878 mov eax, dword ptr fs:[00000030h] | 0_2_022FE878 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_022FE878 mov ecx, dword ptr fs:[00000030h] | 0_2_022FE878 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_022FE878 mov eax, dword ptr fs:[00000030h] | 0_2_022FE878 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_022FE878 mov eax, dword ptr fs:[00000030h] | 0_2_022FE878 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_022FE878 mov eax, dword ptr fs:[00000030h] | 0_2_022FE878 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_022FE878 mov eax, dword ptr fs:[00000030h] | 0_2_022FE878 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0231F86B mov eax, dword ptr fs:[00000030h] | 0_2_0231F86B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0231F86B mov ecx, dword ptr fs:[00000030h] | 0_2_0231F86B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_022F884B mov eax, dword ptr fs:[00000030h] | 0_2_022F884B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_022F884B mov ecx, dword ptr fs:[00000030h] | 0_2_022F884B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_022F884B mov eax, dword ptr fs:[00000030h] | 0_2_022F884B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0233B8BB mov eax, dword ptr fs:[00000030h] | 0_2_0233B8BB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0233B8BB mov eax, dword ptr fs:[00000030h] | 0_2_0233B8BB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_023288BB mov eax, dword ptr fs:[00000030h] | 0_2_023288BB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0233988B mov ecx, dword ptr fs:[00000030h] | 0_2_0233988B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_023188FB mov eax, dword ptr fs:[00000030h] | 0_2_023188FB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0230C8FB mov eax, dword ptr fs:[00000030h] | 0_2_0230C8FB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0233A8C8 mov eax, dword ptr fs:[00000030h] | 0_2_0233A8C8 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02318935 mov eax, dword ptr fs:[00000030h] | 0_2_02318935 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0232892B mov eax, dword ptr fs:[00000030h] | 0_2_0232892B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_022FF90C mov eax, dword ptr fs:[00000030h] | 0_2_022FF90C |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_022FF90C mov eax, dword ptr fs:[00000030h] | 0_2_022FF90C |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_022FF90C mov eax, dword ptr fs:[00000030h] | 0_2_022FF90C |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_022FF90C mov eax, dword ptr fs:[00000030h] | 0_2_022FF90C |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_022FF90C mov eax, dword ptr fs:[00000030h] | 0_2_022FF90C |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_022FA91B mov eax, dword ptr fs:[00000030h] | 0_2_022FA91B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02331957 mov eax, dword ptr fs:[00000030h] | 0_2_02331957 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02331957 mov eax, dword ptr fs:[00000030h] | 0_2_02331957 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0230B95B mov eax, dword ptr fs:[00000030h] | 0_2_0230B95B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0230B95B mov eax, dword ptr fs:[00000030h] | 0_2_0230B95B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0230B95B mov eax, dword ptr fs:[00000030h] | 0_2_0230B95B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0230B95B mov eax, dword ptr fs:[00000030h] | 0_2_0230B95B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0230C9AB mov eax, dword ptr fs:[00000030h] | 0_2_0230C9AB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0233B9A8 mov eax, dword ptr fs:[00000030h] | 0_2_0233B9A8 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0233B9A8 mov eax, dword ptr fs:[00000030h] | 0_2_0233B9A8 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0233B9A8 mov eax, dword ptr fs:[00000030h] | 0_2_0233B9A8 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0233B9A8 mov eax, dword ptr fs:[00000030h] | 0_2_0233B9A8 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_022E199B mov eax, dword ptr fs:[00000030h] | 0_2_022E199B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0231A9CA mov eax, dword ptr fs:[00000030h] | 0_2_0231A9CA |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02319E0B mov eax, dword ptr fs:[00000030h] | 0_2_02319E0B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02338E4D mov eax, dword ptr fs:[00000030h] | 0_2_02338E4D |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0233BE91 mov eax, dword ptr fs:[00000030h] | 0_2_0233BE91 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0233BE91 mov eax, dword ptr fs:[00000030h] | 0_2_0233BE91 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0233BE91 mov eax, dword ptr fs:[00000030h] | 0_2_0233BE91 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0233BE91 mov eax, dword ptr fs:[00000030h] | 0_2_0233BE91 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02307E92 mov eax, dword ptr fs:[00000030h] | 0_2_02307E92 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02307E92 mov eax, dword ptr fs:[00000030h] | 0_2_02307E92 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02307E92 mov eax, dword ptr fs:[00000030h] | 0_2_02307E92 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0233AEE5 mov eax, dword ptr fs:[00000030h] | 0_2_0233AEE5 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02309F3B mov eax, dword ptr fs:[00000030h] | 0_2_02309F3B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02309F3B mov ecx, dword ptr fs:[00000030h] | 0_2_02309F3B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02337F22 mov eax, dword ptr fs:[00000030h] | 0_2_02337F22 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02335F29 mov eax, dword ptr fs:[00000030h] | 0_2_02335F29 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02332F2F mov eax, dword ptr fs:[00000030h] | 0_2_02332F2F |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0232DF12 mov eax, dword ptr fs:[00000030h] | 0_2_0232DF12 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0232DF12 mov ecx, dword ptr fs:[00000030h] | 0_2_0232DF12 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02322F1B mov eax, dword ptr fs:[00000030h] | 0_2_02322F1B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02322F1B mov eax, dword ptr fs:[00000030h] | 0_2_02322F1B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02308F4B mov eax, dword ptr fs:[00000030h] | 0_2_02308F4B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02308F4B mov eax, dword ptr fs:[00000030h] | 0_2_02308F4B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02308F4B mov eax, dword ptr fs:[00000030h] | 0_2_02308F4B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0231AFBB mov eax, dword ptr fs:[00000030h] | 0_2_0231AFBB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0231AFBB mov eax, dword ptr fs:[00000030h] | 0_2_0231AFBB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0230CFAB mov eax, dword ptr fs:[00000030h] | 0_2_0230CFAB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02323FFC mov eax, dword ptr fs:[00000030h] | 0_2_02323FFC |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02323FFC mov ecx, dword ptr fs:[00000030h] | 0_2_02323FFC |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_022FDFFB mov eax, dword ptr fs:[00000030h] | 0_2_022FDFFB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_022E7FF2 mov eax, dword ptr fs:[00000030h] | 0_2_022E7FF2 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_022E7FF2 mov eax, dword ptr fs:[00000030h] | 0_2_022E7FF2 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_022F8FCB mov eax, dword ptr fs:[00000030h] | 0_2_022F8FCB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_022F8FCB mov ecx, dword ptr fs:[00000030h] | 0_2_022F8FCB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02328FD7 mov eax, dword ptr fs:[00000030h] | 0_2_02328FD7 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0231FC3B mov eax, dword ptr fs:[00000030h] | 0_2_0231FC3B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0231FC3B mov ecx, dword ptr fs:[00000030h] | 0_2_0231FC3B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0233BC14 mov eax, dword ptr fs:[00000030h] | 0_2_0233BC14 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0233BC14 mov eax, dword ptr fs:[00000030h] | 0_2_0233BC14 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02336C03 mov eax, dword ptr fs:[00000030h] | 0_2_02336C03 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02336C03 mov eax, dword ptr fs:[00000030h] | 0_2_02336C03 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_022E7C75 mov eax, dword ptr fs:[00000030h] | 0_2_022E7C75 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02309C50 mov eax, dword ptr fs:[00000030h] | 0_2_02309C50 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02333C4C mov eax, dword ptr fs:[00000030h] | 0_2_02333C4C |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02339CAB mov eax, dword ptr fs:[00000030h] | 0_2_02339CAB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02339CAB mov ecx, dword ptr fs:[00000030h] | 0_2_02339CAB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02324C9B mov ecx, dword ptr fs:[00000030h] | 0_2_02324C9B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02328C9B mov eax, dword ptr fs:[00000030h] | 0_2_02328C9B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02324CDB mov eax, dword ptr fs:[00000030h] | 0_2_02324CDB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02319CCB mov eax, dword ptr fs:[00000030h] | 0_2_02319CCB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02308D1B mov eax, dword ptr fs:[00000030h] | 0_2_02308D1B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02308D1B mov eax, dword ptr fs:[00000030h] | 0_2_02308D1B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02308D1B mov eax, dword ptr fs:[00000030h] | 0_2_02308D1B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02308D1B mov eax, dword ptr fs:[00000030h] | 0_2_02308D1B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_022D8D1B mov eax, dword ptr fs:[00000030h] | 0_2_022D8D1B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_022D8D1B mov eax, dword ptr fs:[00000030h] | 0_2_022D8D1B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_022D8D1B mov eax, dword ptr fs:[00000030h] | 0_2_022D8D1B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_022D8D1B mov eax, dword ptr fs:[00000030h] | 0_2_022D8D1B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02307D08 mov eax, dword ptr fs:[00000030h] | 0_2_02307D08 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02307D08 mov eax, dword ptr fs:[00000030h] | 0_2_02307D08 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02307D08 mov ecx, dword ptr fs:[00000030h] | 0_2_02307D08 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02337D71 mov eax, dword ptr fs:[00000030h] | 0_2_02337D71 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02337D71 mov eax, dword ptr fs:[00000030h] | 0_2_02337D71 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02324D6B mov ecx, dword ptr fs:[00000030h] | 0_2_02324D6B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0230BDAB mov eax, dword ptr fs:[00000030h] | 0_2_0230BDAB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0230BDAB mov eax, dword ptr fs:[00000030h] | 0_2_0230BDAB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0230BDAB mov eax, dword ptr fs:[00000030h] | 0_2_0230BDAB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0230BDAB mov ecx, dword ptr fs:[00000030h] | 0_2_0230BDAB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0230BDAB mov eax, dword ptr fs:[00000030h] | 0_2_0230BDAB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0230BDAB mov eax, dword ptr fs:[00000030h] | 0_2_0230BDAB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0230BDAB mov eax, dword ptr fs:[00000030h] | 0_2_0230BDAB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0230BDAB mov eax, dword ptr fs:[00000030h] | 0_2_0230BDAB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0230BDAB mov eax, dword ptr fs:[00000030h] | 0_2_0230BDAB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0232ED80 mov eax, dword ptr fs:[00000030h] | 0_2_0232ED80 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0232ED80 mov eax, dword ptr fs:[00000030h] | 0_2_0232ED80 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02327DC3 mov eax, dword ptr fs:[00000030h] | 0_2_02327DC3 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02327DC3 mov eax, dword ptr fs:[00000030h] | 0_2_02327DC3 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02327DC3 mov eax, dword ptr fs:[00000030h] | 0_2_02327DC3 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02327DC3 mov eax, dword ptr fs:[00000030h] | 0_2_02327DC3 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02327DC3 mov eax, dword ptr fs:[00000030h] | 0_2_02327DC3 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02327DC3 mov eax, dword ptr fs:[00000030h] | 0_2_02327DC3 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02327DC3 mov eax, dword ptr fs:[00000030h] | 0_2_02327DC3 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02327DC3 mov eax, dword ptr fs:[00000030h] | 0_2_02327DC3 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02327DC3 mov eax, dword ptr fs:[00000030h] | 0_2_02327DC3 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02319DCB mov eax, dword ptr fs:[00000030h] | 0_2_02319DCB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024D13ED mov eax, dword ptr fs:[00000030h] | 0_2_024D13ED |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024D13ED mov eax, dword ptr fs:[00000030h] | 0_2_024D13ED |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024D13ED mov eax, dword ptr fs:[00000030h] | 0_2_024D13ED |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024D13ED mov eax, dword ptr fs:[00000030h] | 0_2_024D13ED |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024D13ED mov ecx, dword ptr fs:[00000030h] | 0_2_024D13ED |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024D13ED mov ecx, dword ptr fs:[00000030h] | 0_2_024D13ED |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024D13ED mov eax, dword ptr fs:[00000030h] | 0_2_024D13ED |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024D13ED mov ecx, dword ptr fs:[00000030h] | 0_2_024D13ED |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024D13ED mov ecx, dword ptr fs:[00000030h] | 0_2_024D13ED |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024D13ED mov eax, dword ptr fs:[00000030h] | 0_2_024D13ED |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024D13ED mov ecx, dword ptr fs:[00000030h] | 0_2_024D13ED |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024D13ED mov ecx, dword ptr fs:[00000030h] | 0_2_024D13ED |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024D13ED mov eax, dword ptr fs:[00000030h] | 0_2_024D13ED |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024D13ED mov eax, dword ptr fs:[00000030h] | 0_2_024D13ED |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024D13ED mov eax, dword ptr fs:[00000030h] | 0_2_024D13ED |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024D13ED mov eax, dword ptr fs:[00000030h] | 0_2_024D13ED |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024D13ED mov eax, dword ptr fs:[00000030h] | 0_2_024D13ED |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024D13ED mov eax, dword ptr fs:[00000030h] | 0_2_024D13ED |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024D13ED mov eax, dword ptr fs:[00000030h] | 0_2_024D13ED |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024D13ED mov eax, dword ptr fs:[00000030h] | 0_2_024D13ED |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024DB45E mov eax, dword ptr fs:[00000030h] | 0_2_024DB45E |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024DB45E mov eax, dword ptr fs:[00000030h] | 0_2_024DB45E |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024DB45E mov eax, dword ptr fs:[00000030h] | 0_2_024DB45E |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024DE48E mov eax, dword ptr fs:[00000030h] | 0_2_024DE48E |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024CDBE2 mov eax, dword ptr fs:[00000030h] | 0_2_024CDBE2 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024CDBE2 mov eax, dword ptr fs:[00000030h] | 0_2_024CDBE2 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024CDBE2 mov eax, dword ptr fs:[00000030h] | 0_2_024CDBE2 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024CDBE2 mov eax, dword ptr fs:[00000030h] | 0_2_024CDBE2 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024CDBE2 mov eax, dword ptr fs:[00000030h] | 0_2_024CDBE2 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024CDBE2 mov eax, dword ptr fs:[00000030h] | 0_2_024CDBE2 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024EBC94 mov eax, dword ptr fs:[00000030h] | 0_2_024EBC94 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024EBC94 mov eax, dword ptr fs:[00000030h] | 0_2_024EBC94 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024EBC94 mov eax, dword ptr fs:[00000030h] | 0_2_024EBC94 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024EBC94 mov eax, dword ptr fs:[00000030h] | 0_2_024EBC94 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024EBC94 mov eax, dword ptr fs:[00000030h] | 0_2_024EBC94 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024EBC94 mov eax, dword ptr fs:[00000030h] | 0_2_024EBC94 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024EBC94 mov eax, dword ptr fs:[00000030h] | 0_2_024EBC94 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024EBC94 mov eax, dword ptr fs:[00000030h] | 0_2_024EBC94 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0257225D mov eax, dword ptr fs:[00000030h] | 0_2_0257225D |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0257225D mov eax, dword ptr fs:[00000030h] | 0_2_0257225D |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0257D244 mov eax, dword ptr fs:[00000030h] | 0_2_0257D244 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024CE26B mov eax, dword ptr fs:[00000030h] | 0_2_024CE26B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024CE26B mov eax, dword ptr fs:[00000030h] | 0_2_024CE26B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024B527A mov eax, dword ptr fs:[00000030h] | 0_2_024B527A |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024B527A mov ecx, dword ptr fs:[00000030h] | 0_2_024B527A |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024DE278 mov eax, dword ptr fs:[00000030h] | 0_2_024DE278 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024DE278 mov eax, dword ptr fs:[00000030h] | 0_2_024DE278 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024DE278 mov eax, dword ptr fs:[00000030h] | 0_2_024DE278 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02590204 mov eax, dword ptr fs:[00000030h] | 0_2_02590204 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02590204 mov eax, dword ptr fs:[00000030h] | 0_2_02590204 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02590204 mov eax, dword ptr fs:[00000030h] | 0_2_02590204 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_02590204 mov eax, dword ptr fs:[00000030h] | 0_2_02590204 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0259122D mov eax, dword ptr fs:[00000030h] | 0_2_0259122D |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0259122D mov eax, dword ptr fs:[00000030h] | 0_2_0259122D |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0259122D mov eax, dword ptr fs:[00000030h] | 0_2_0259122D |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024BC2CD mov eax, dword ptr fs:[00000030h] | 0_2_024BC2CD |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_025472DF mov eax, dword ptr fs:[00000030h] | 0_2_025472DF |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0258B2D4 mov eax, dword ptr fs:[00000030h] | 0_2_0258B2D4 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0258B2D4 mov eax, dword ptr fs:[00000030h] | 0_2_0258B2D4 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0258B2D4 mov eax, dword ptr fs:[00000030h] | 0_2_0258B2D4 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0255A2CD mov eax, dword ptr fs:[00000030h] | 0_2_0255A2CD |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0255A2CD mov eax, dword ptr fs:[00000030h] | 0_2_0255A2CD |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024B52ED mov eax, dword ptr fs:[00000030h] | 0_2_024B52ED |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024B52ED mov ecx, dword ptr fs:[00000030h] | 0_2_024B52ED |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024B52ED mov eax, dword ptr fs:[00000030h] | 0_2_024B52ED |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024B52ED mov eax, dword ptr fs:[00000030h] | 0_2_024B52ED |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024F92E8 mov esi, dword ptr fs:[00000030h] | 0_2_024F92E8 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0257D2FC mov eax, dword ptr fs:[00000030h] | 0_2_0257D2FC |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0258F2E9 mov eax, dword ptr fs:[00000030h] | 0_2_0258F2E9 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_025622E1 mov eax, dword ptr fs:[00000030h] | 0_2_025622E1 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_025622E1 mov eax, dword ptr fs:[00000030h] | 0_2_025622E1 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_025622E1 mov eax, dword ptr fs:[00000030h] | 0_2_025622E1 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_025622E1 mov eax, dword ptr fs:[00000030h] | 0_2_025622E1 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_025622E1 mov eax, dword ptr fs:[00000030h] | 0_2_025622E1 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_025622E1 mov eax, dword ptr fs:[00000030h] | 0_2_025622E1 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_025622E1 mov ecx, dword ptr fs:[00000030h] | 0_2_025622E1 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0254A29D mov eax, dword ptr fs:[00000030h] | 0_2_0254A29D |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0254D289 mov eax, dword ptr fs:[00000030h] | 0_2_0254D289 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0254D289 mov eax, dword ptr fs:[00000030h] | 0_2_0254D289 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0254D289 mov eax, dword ptr fs:[00000030h] | 0_2_0254D289 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024CE2AD mov eax, dword ptr fs:[00000030h] | 0_2_024CE2AD |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024CE2AD mov eax, dword ptr fs:[00000030h] | 0_2_024CE2AD |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024CE2AD mov eax, dword ptr fs:[00000030h] | 0_2_024CE2AD |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024CE2AD mov eax, dword ptr fs:[00000030h] | 0_2_024CE2AD |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024EC2A9 mov eax, dword ptr fs:[00000030h] | 0_2_024EC2A9 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_025422BC mov eax, dword ptr fs:[00000030h] | 0_2_025422BC |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_025492BD mov eax, dword ptr fs:[00000030h] | 0_2_025492BD |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_025492BD mov eax, dword ptr fs:[00000030h] | 0_2_025492BD |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_025492BD mov ecx, dword ptr fs:[00000030h] | 0_2_025492BD |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0257D2A0 mov eax, dword ptr fs:[00000030h] | 0_2_0257D2A0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_025992AE mov eax, dword ptr fs:[00000030h] | 0_2_025992AE |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_025992AE mov eax, dword ptr fs:[00000030h] | 0_2_025992AE |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024BB34D mov eax, dword ptr fs:[00000030h] | 0_2_024BB34D |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0257D358 mov eax, dword ptr fs:[00000030h] | 0_2_0257D358 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0257D358 mov eax, dword ptr fs:[00000030h] | 0_2_0257D358 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0257D358 mov eax, dword ptr fs:[00000030h] | 0_2_0257D358 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0257D358 mov eax, dword ptr fs:[00000030h] | 0_2_0257D358 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0257D358 mov eax, dword ptr fs:[00000030h] | 0_2_0257D358 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0257D358 mov eax, dword ptr fs:[00000030h] | 0_2_0257D358 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0257D358 mov eax, dword ptr fs:[00000030h] | 0_2_0257D358 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0257D358 mov eax, dword ptr fs:[00000030h] | 0_2_0257D358 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0257D358 mov eax, dword ptr fs:[00000030h] | 0_2_0257D358 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0257D358 mov eax, dword ptr fs:[00000030h] | 0_2_0257D358 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0257D358 mov eax, dword ptr fs:[00000030h] | 0_2_0257D358 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0257D358 mov eax, dword ptr fs:[00000030h] | 0_2_0257D358 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0257D358 mov eax, dword ptr fs:[00000030h] | 0_2_0257D358 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0257D358 mov eax, dword ptr fs:[00000030h] | 0_2_0257D358 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0253A34D mov ecx, dword ptr fs:[00000030h] | 0_2_0253A34D |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0253A34D mov eax, dword ptr fs:[00000030h] | 0_2_0253A34D |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0253A34D mov eax, dword ptr fs:[00000030h] | 0_2_0253A34D |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0253A34D mov eax, dword ptr fs:[00000030h] | 0_2_0253A34D |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024F336D mov eax, dword ptr fs:[00000030h] | 0_2_024F336D |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024F336D mov eax, dword ptr fs:[00000030h] | 0_2_024F336D |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0256E362 mov eax, dword ptr fs:[00000030h] | 0_2_0256E362 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0256E362 mov eax, dword ptr fs:[00000030h] | 0_2_0256E362 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0256E362 mov eax, dword ptr fs:[00000030h] | 0_2_0256E362 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0256E362 mov eax, dword ptr fs:[00000030h] | 0_2_0256E362 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0256E362 mov eax, dword ptr fs:[00000030h] | 0_2_0256E362 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0256E362 mov eax, dword ptr fs:[00000030h] | 0_2_0256E362 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0256E362 mov eax, dword ptr fs:[00000030h] | 0_2_0256E362 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0256E362 mov eax, dword ptr fs:[00000030h] | 0_2_0256E362 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0256E362 mov eax, dword ptr fs:[00000030h] | 0_2_0256E362 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0256E362 mov eax, dword ptr fs:[00000030h] | 0_2_0256E362 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0256E362 mov eax, dword ptr fs:[00000030h] | 0_2_0256E362 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0256E362 mov eax, dword ptr fs:[00000030h] | 0_2_0256E362 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0256E362 mov eax, dword ptr fs:[00000030h] | 0_2_0256E362 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024B637D mov eax, dword ptr fs:[00000030h] | 0_2_024B637D |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024CF30D mov eax, dword ptr fs:[00000030h] | 0_2_024CF30D |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024EF329 mov eax, dword ptr fs:[00000030h] | 0_2_024EF329 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024D13CD mov eax, dword ptr fs:[00000030h] | 0_2_024D13CD |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0254D3D7 mov eax, dword ptr fs:[00000030h] | 0_2_0254D3D7 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0254D3D7 mov eax, dword ptr fs:[00000030h] | 0_2_0254D3D7 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_025923DD mov eax, dword ptr fs:[00000030h] | 0_2_025923DD |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_025463CD mov eax, dword ptr fs:[00000030h] | 0_2_025463CD |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0254B3F4 mov eax, dword ptr fs:[00000030h] | 0_2_0254B3F4 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_025933FD mov eax, dword ptr fs:[00000030h] | 0_2_025933FD |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_025933FD mov eax, dword ptr fs:[00000030h] | 0_2_025933FD |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024B53EE mov eax, dword ptr fs:[00000030h] | 0_2_024B53EE |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024B5382 mov eax, dword ptr fs:[00000030h] | 0_2_024B5382 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024B5382 mov eax, dword ptr fs:[00000030h] | 0_2_024B5382 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024B5382 mov eax, dword ptr fs:[00000030h] | 0_2_024B5382 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_024B5382 mov eax, dword ptr fs:[00000030h] | 0_2_024B5382 |