Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0085408D |
0_2_0085408D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0086809C |
0_2_0086809C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008D6092 |
0_2_008D6092 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0083C0A3 |
0_2_0083C0A3 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_009040BD |
0_2_009040BD |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0081A0BB |
0_2_0081A0BB |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007F803D |
0_2_007F803D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0090A0CF |
0_2_0090A0CF |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008B40EE |
0_2_008B40EE |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007F6015 |
0_2_007F6015 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008E20F5 |
0_2_008E20F5 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_009080ED |
0_2_009080ED |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008C4009 |
0_2_008C4009 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007BE0EA |
0_2_007BE0EA |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008C2017 |
0_2_008C2017 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0084C041 |
0_2_0084C041 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00836048 |
0_2_00836048 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007F20AE |
0_2_007F20AE |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0089005D |
0_2_0089005D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007C60AB |
0_2_007C60AB |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0081E06B |
0_2_0081E06B |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0083A079 |
0_2_0083A079 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007EA085 |
0_2_007EA085 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0084E07F |
0_2_0084E07F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0080E189 |
0_2_0080E189 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007E6175 |
0_2_007E6175 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00828189 |
0_2_00828189 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007DC16D |
0_2_007DC16D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007FA16C |
0_2_007FA16C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00852199 |
0_2_00852199 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00888196 |
0_2_00888196 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007D2158 |
0_2_007D2158 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008501B4 |
0_2_008501B4 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008021C0 |
0_2_008021C0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008841C2 |
0_2_008841C2 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008B01C1 |
0_2_008B01C1 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0081C1CF |
0_2_0081C1CF |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008DE1DD |
0_2_008DE1DD |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008601D1 |
0_2_008601D1 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0082C1E2 |
0_2_0082C1E2 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008EC1E1 |
0_2_008EC1E1 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007B6108 |
0_2_007B6108 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008A01FD |
0_2_008A01FD |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0086E109 |
0_2_0086E109 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00848116 |
0_2_00848116 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0087E113 |
0_2_0087E113 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008F8118 |
0_2_008F8118 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0092613D |
0_2_0092613D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008E613E |
0_2_008E613E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008C615C |
0_2_008C615C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0082615C |
0_2_0082615C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0091014E |
0_2_0091014E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008A816A |
0_2_008A816A |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0082216E |
0_2_0082216E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00886172 |
0_2_00886172 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008D8173 |
0_2_008D8173 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0088A28A |
0_2_0088A28A |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008A6288 |
0_2_008A6288 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007C427A |
0_2_007C427A |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007C827A |
0_2_007C827A |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007E0270 |
0_2_007E0270 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_009102B0 |
0_2_009102B0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008E42AD |
0_2_008E42AD |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007D6256 |
0_2_007D6256 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0086A2C4 |
0_2_0086A2C4 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008622C5 |
0_2_008622C5 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0085A2CD |
0_2_0085A2CD |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0082A2CB |
0_2_0082A2CB |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008EA2E4 |
0_2_008EA2E4 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008C82E0 |
0_2_008C82E0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008542EA |
0_2_008542EA |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0081E2FC |
0_2_0081E2FC |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007DE2F4 |
0_2_007DE2F4 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0082020B |
0_2_0082020B |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0085C20F |
0_2_0085C20F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008FA222 |
0_2_008FA222 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00866236 |
0_2_00866236 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00912222 |
0_2_00912222 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0089C23F |
0_2_0089C23F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007E22C7 |
0_2_007E22C7 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007EE2C1 |
0_2_007EE2C1 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007F42B4 |
0_2_007F42B4 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0080C24C |
0_2_0080C24C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00842249 |
0_2_00842249 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008BA258 |
0_2_008BA258 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0083425B |
0_2_0083425B |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0083025F |
0_2_0083025F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00852267 |
0_2_00852267 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0088C261 |
0_2_0088C261 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008AE260 |
0_2_008AE260 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008CA27F |
0_2_008CA27F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008AC272 |
0_2_008AC272 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0081227C |
0_2_0081227C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0090E26F |
0_2_0090E26F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0084C38B |
0_2_0084C38B |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008BC398 |
0_2_008BC398 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008E0399 |
0_2_008E0399 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_009023D0 |
0_2_009023D0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007F6330 |
0_2_007F6330 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008D23DC |
0_2_008D23DC |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007F0326 |
0_2_007F0326 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007BC31B |
0_2_007BC31B |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008F63E7 |
0_2_008F63E7 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008B63F0 |
0_2_008B63F0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0080A3FE |
0_2_0080A3FE |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0088030A |
0_2_0088030A |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008F430C |
0_2_008F430C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00838319 |
0_2_00838319 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008A2326 |
0_2_008A2326 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0083E343 |
0_2_0083E343 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0087A35C |
0_2_0087A35C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007FE39A |
0_2_007FE39A |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0081037D |
0_2_0081037D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00892489 |
0_2_00892489 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00824488 |
0_2_00824488 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008D4486 |
0_2_008D4486 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007D0472 |
0_2_007D0472 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007EC442 |
0_2_007EC442 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007C2441 |
0_2_007C2441 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008CC4B1 |
0_2_008CC4B1 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008EC4B1 |
0_2_008EC4B1 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_009044D6 |
0_2_009044D6 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008E64D5 |
0_2_008E64D5 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0089E4F8 |
0_2_0089E4F8 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008084FD |
0_2_008084FD |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007D44FC |
0_2_007D44FC |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007FA4FE |
0_2_007FA4FE |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00844400 |
0_2_00844400 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00884405 |
0_2_00884405 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007B64E8 |
0_2_007B64E8 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008B442B |
0_2_008B442B |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0085E421 |
0_2_0085E421 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008B2433 |
0_2_008B2433 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00800445 |
0_2_00800445 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007E44B9 |
0_2_007E44B9 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007DA4B5 |
0_2_007DA4B5 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007F84B0 |
0_2_007F84B0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0085445D |
0_2_0085445D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0090A448 |
0_2_0090A448 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008A4456 |
0_2_008A4456 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008FC453 |
0_2_008FC453 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00830463 |
0_2_00830463 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0081E463 |
0_2_0081E463 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0086E475 |
0_2_0086E475 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00814475 |
0_2_00814475 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007C6483 |
0_2_007C6483 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0082E580 |
0_2_0082E580 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007CA57A |
0_2_007CA57A |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007BC573 |
0_2_007BC573 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00834588 |
0_2_00834588 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00874597 |
0_2_00874597 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00818595 |
0_2_00818595 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007E8566 |
0_2_007E8566 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008605A0 |
0_2_008605A0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008A05B2 |
0_2_008A05B2 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0082A5BB |
0_2_0082A5BB |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_009065AF |
0_2_009065AF |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008205C8 |
0_2_008205C8 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008A65DB |
0_2_008A65DB |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008785E6 |
0_2_008785E6 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_009105FA |
0_2_009105FA |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007FC513 |
0_2_007FC513 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0088C5F3 |
0_2_0088C5F3 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0086450C |
0_2_0086450C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007D65F7 |
0_2_007D65F7 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0090251B |
0_2_0090251B |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008D6502 |
0_2_008D6502 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008AA519 |
0_2_008AA519 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008E2515 |
0_2_008E2515 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00908533 |
0_2_00908533 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00836525 |
0_2_00836525 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0086C52F |
0_2_0086C52F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008F8533 |
0_2_008F8533 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008DC541 |
0_2_008DC541 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008B655D |
0_2_008B655D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00876565 |
0_2_00876565 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0088057B |
0_2_0088057B |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00898572 |
0_2_00898572 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007CE581 |
0_2_007CE581 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00822685 |
0_2_00822685 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00872689 |
0_2_00872689 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0083C6A0 |
0_2_0083C6A0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008B06A3 |
0_2_008B06A3 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008706AC |
0_2_008706AC |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008DA6A1 |
0_2_008DA6A1 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008846B7 |
0_2_008846B7 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0082C6C3 |
0_2_0082C6C3 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_009246D9 |
0_2_009246D9 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007C0629 |
0_2_007C0629 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007F861D |
0_2_007F861D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008506EC |
0_2_008506EC |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008046F1 |
0_2_008046F1 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008E46F6 |
0_2_008E46F6 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0090A6EA |
0_2_0090A6EA |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00828606 |
0_2_00828606 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008BA603 |
0_2_008BA603 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007D26EE |
0_2_007D26EE |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00858625 |
0_2_00858625 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007DE6DF |
0_2_007DE6DF |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008FA62C |
0_2_008FA62C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007EC6D4 |
0_2_007EC6D4 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007E26CE |
0_2_007E26CE |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00842635 |
0_2_00842635 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008B863F |
0_2_008B863F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008F464E |
0_2_008F464E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0088864A |
0_2_0088864A |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0090C656 |
0_2_0090C656 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00830650 |
0_2_00830650 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0090E648 |
0_2_0090E648 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008CA653 |
0_2_008CA653 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0085C672 |
0_2_0085C672 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007BA685 |
0_2_007BA685 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008D0673 |
0_2_008D0673 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0084C785 |
0_2_0084C785 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007FE772 |
0_2_007FE772 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008AC799 |
0_2_008AC799 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0086479D |
0_2_0086479D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008F87AF |
0_2_008F87AF |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008127A0 |
0_2_008127A0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007F274B |
0_2_007F274B |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008927CD |
0_2_008927CD |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0086E7C2 |
0_2_0086E7C2 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008C07CA |
0_2_008C07CA |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008A27DB |
0_2_008A27DB |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008FC7D4 |
0_2_008FC7D4 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008A071D |
0_2_008A071D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008F2713 |
0_2_008F2713 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0089072B |
0_2_0089072B |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007EE7D9 |
0_2_007EE7D9 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007CC7CB |
0_2_007CC7CB |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008AE736 |
0_2_008AE736 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008C4733 |
0_2_008C4733 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00896749 |
0_2_00896749 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007BA7B2 |
0_2_007BA7B2 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008DE75E |
0_2_008DE75E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00844750 |
0_2_00844750 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007BC7AD |
0_2_007BC7AD |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00894750 |
0_2_00894750 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00856765 |
0_2_00856765 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008EA768 |
0_2_008EA768 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007C8797 |
0_2_007C8797 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0085A768 |
0_2_0085A768 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007C2785 |
0_2_007C2785 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008A4882 |
0_2_008A4882 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008B2881 |
0_2_008B2881 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0084688A |
0_2_0084688A |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00826894 |
0_2_00826894 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0087C8AE |
0_2_0087C8AE |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_009048BB |
0_2_009048BB |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008DC8A1 |
0_2_008DC8A1 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007B6856 |
0_2_007B6856 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0081A8B4 |
0_2_0081A8B4 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008088BA |
0_2_008088BA |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008A68CB |
0_2_008A68CB |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008388C9 |
0_2_008388C9 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007D4833 |
0_2_007D4833 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008D88C2 |
0_2_008D88C2 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007D082C |
0_2_007D082C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008A88D2 |
0_2_008A88D2 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008E88E5 |
0_2_008E88E5 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0082E8F7 |
0_2_0082E8F7 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008EE80F |
0_2_008EE80F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007E88F6 |
0_2_007E88F6 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007FA8F7 |
0_2_007FA8F7 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0080E80C |
0_2_0080E80C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0090083E |
0_2_0090083E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0087283D |
0_2_0087283D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0083E850 |
0_2_0083E850 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0088285D |
0_2_0088285D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007F289E |
0_2_007F289E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0089886B |
0_2_0089886B |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007C689F |
0_2_007C689F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0084E868 |
0_2_0084E868 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0084E86A |
0_2_0084E86A |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007EC88C |
0_2_007EC88C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0083698B |
0_2_0083698B |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0084A988 |
0_2_0084A988 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007B8969 |
0_2_007B8969 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007EE96C |
0_2_007EE96C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_009089BE |
0_2_009089BE |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007FC947 |
0_2_007FC947 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008789B9 |
0_2_008789B9 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0081E9C3 |
0_2_0081E9C3 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007CA92F |
0_2_007CA92F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008589D6 |
0_2_008589D6 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008B69DE |
0_2_008B69DE |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008BC9D7 |
0_2_008BC9D7 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008609D9 |
0_2_008609D9 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008649D9 |
0_2_008649D9 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008429E7 |
0_2_008429E7 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008CC9E8 |
0_2_008CC9E8 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008269EA |
0_2_008269EA |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008629EE |
0_2_008629EE |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007B69E1 |
0_2_007B69E1 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0083C91F |
0_2_0083C91F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00A0A93D |
0_2_00A0A93D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0085291B |
0_2_0085291B |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007C29DB |
0_2_007C29DB |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00802927 |
0_2_00802927 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007E09C0 |
0_2_007E09C0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0080C943 |
0_2_0080C943 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0082A94B |
0_2_0082A94B |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0083094E |
0_2_0083094E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0089295B |
0_2_0089295B |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007F49A4 |
0_2_007F49A4 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008CA96D |
0_2_008CA96D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0089A96D |
0_2_0089A96D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00876962 |
0_2_00876962 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00832971 |
0_2_00832971 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0088097E |
0_2_0088097E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007E2A64 |
0_2_007E2A64 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007DEA60 |
0_2_007DEA60 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00814AC6 |
0_2_00814AC6 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0090EAC0 |
0_2_0090EAC0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00806AE0 |
0_2_00806AE0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007D6A0B |
0_2_007D6A0B |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00844AF2 |
0_2_00844AF2 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007DAA05 |
0_2_007DAA05 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00816A0C |
0_2_00816A0C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00846A0B |
0_2_00846A0B |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00866A17 |
0_2_00866A17 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00888A1C |
0_2_00888A1C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00854A12 |
0_2_00854A12 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00804A1C |
0_2_00804A1C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008B0A17 |
0_2_008B0A17 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00824A24 |
0_2_00824A24 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008BAA38 |
0_2_008BAA38 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007F6A9E |
0_2_007F6A9E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00820A6F |
0_2_00820A6F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00822A71 |
0_2_00822A71 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008BEA7E |
0_2_008BEA7E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008B8B8A |
0_2_008B8B8A |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007D2B6F |
0_2_007D2B6F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00802B9D |
0_2_00802B9D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008FCBA3 |
0_2_008FCBA3 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008F8BCB |
0_2_008F8BCB |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0085ABE0 |
0_2_0085ABE0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00884BE4 |
0_2_00884BE4 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008FEB01 |
0_2_008FEB01 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0086CB16 |
0_2_0086CB16 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007D4BE9 |
0_2_007D4BE9 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008E2B1B |
0_2_008E2B1B |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007EABD7 |
0_2_007EABD7 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007C6BD3 |
0_2_007C6BD3 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0090AB3F |
0_2_0090AB3F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007CCBC7 |
0_2_007CCBC7 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00870B46 |
0_2_00870B46 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00838B4F |
0_2_00838B4F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008D4B5E |
0_2_008D4B5E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008DAB5E |
0_2_008DAB5E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007F8B9E |
0_2_007F8B9E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0084EB68 |
0_2_0084EB68 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0088AB7D |
0_2_0088AB7D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00904B68 |
0_2_00904B68 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007BEB80 |
0_2_007BEB80 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007D8B86 |
0_2_007D8B86 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0091AB6D |
0_2_0091AB6D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00882C98 |
0_2_00882C98 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00894C9D |
0_2_00894C9D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007CAC65 |
0_2_007CAC65 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008D4CAE |
0_2_008D4CAE |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007F0C4C |
0_2_007F0C4C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00824CB6 |
0_2_00824CB6 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00922CA7 |
0_2_00922CA7 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0087ACBE |
0_2_0087ACBE |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00900CD0 |
0_2_00900CD0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00848CCD |
0_2_00848CCD |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007C8C31 |
0_2_007C8C31 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007E4C2F |
0_2_007E4C2F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0088CCD9 |
0_2_0088CCD9 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00832CDC |
0_2_00832CDC |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008F6CD0 |
0_2_008F6CD0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007B8C1B |
0_2_007B8C1B |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00918CF3 |
0_2_00918CF3 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00830CE0 |
0_2_00830CE0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0081ACF6 |
0_2_0081ACF6 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00822C00 |
0_2_00822C00 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0083EC07 |
0_2_0083EC07 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00816C10 |
0_2_00816C10 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00896C12 |
0_2_00896C12 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008C6C3C |
0_2_008C6C3C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00812C40 |
0_2_00812C40 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008CCC48 |
0_2_008CCC48 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0080AC4F |
0_2_0080AC4F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00840C52 |
0_2_00840C52 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0084CC52 |
0_2_0084CC52 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0086AC51 |
0_2_0086AC51 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008B4C54 |
0_2_008B4C54 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008A8C61 |
0_2_008A8C61 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008E4C75 |
0_2_008E4C75 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0089CC77 |
0_2_0089CC77 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00906D9D |
0_2_00906D9D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007FAD69 |
0_2_007FAD69 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0089ADA2 |
0_2_0089ADA2 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00908DBD |
0_2_00908DBD |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00892DA7 |
0_2_00892DA7 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008A2DA4 |
0_2_008A2DA4 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00852DBC |
0_2_00852DBC |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008BCDC1 |
0_2_008BCDC1 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008BEDC0 |
0_2_008BEDC0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00896DF8 |
0_2_00896DF8 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00886DFC |
0_2_00886DFC |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0080CDF7 |
0_2_0080CDF7 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008DEDF0 |
0_2_008DEDF0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00874D03 |
0_2_00874D03 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007D6DE2 |
0_2_007D6DE2 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007F4DDB |
0_2_007F4DDB |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007BCDDD |
0_2_007BCDDD |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007D0DA9 |
0_2_007D0DA9 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00828D54 |
0_2_00828D54 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008CAD51 |
0_2_008CAD51 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0088ED6F |
0_2_0088ED6F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00868D6C |
0_2_00868D6C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007E8D91 |
0_2_007E8D91 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00878D73 |
0_2_00878D73 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008F4D75 |
0_2_008F4D75 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00858E8B |
0_2_00858E8B |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00866E94 |
0_2_00866E94 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0090CE89 |
0_2_0090CE89 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008FEE95 |
0_2_008FEE95 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00848EAB |
0_2_00848EAB |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0081EEB6 |
0_2_0081EEB6 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008CAEC9 |
0_2_008CAEC9 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00806ECB |
0_2_00806ECB |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008DAEC3 |
0_2_008DAEC3 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00800EFC |
0_2_00800EFC |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007C0EF9 |
0_2_007C0EF9 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008D6E02 |
0_2_008D6E02 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008AAE18 |
0_2_008AAE18 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00854E18 |
0_2_00854E18 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00838E25 |
0_2_00838E25 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008A4E27 |
0_2_008A4E27 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0082AE32 |
0_2_0082AE32 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008E8E3E |
0_2_008E8E3E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0085EE46 |
0_2_0085EE46 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008F2E5F |
0_2_008F2E5F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007B6E99 |
0_2_007B6E99 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008CEE6F |
0_2_008CEE6F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0086EE60 |
0_2_0086EE60 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007E4F75 |
0_2_007E4F75 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00860F89 |
0_2_00860F89 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00840F93 |
0_2_00840F93 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00904F8B |
0_2_00904F8B |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0084EFA2 |
0_2_0084EFA2 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00908FAE |
0_2_00908FAE |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0080AFCF |
0_2_0080AFCF |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0082CFD3 |
0_2_0082CFD3 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008A8FDD |
0_2_008A8FDD |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008FCFD2 |
0_2_008FCFD2 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007D4F19 |
0_2_007D4F19 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007C2F0D |
0_2_007C2F0D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008FEFF2 |
0_2_008FEFF2 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008E2FF1 |
0_2_008E2FF1 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00856F01 |
0_2_00856F01 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00842F0B |
0_2_00842F0B |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007BAFEA |
0_2_007BAFEA |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008EEF1D |
0_2_008EEF1D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00876F10 |
0_2_00876F10 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0089CF11 |
0_2_0089CF11 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008C4F15 |
0_2_008C4F15 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007C4FDC |
0_2_007C4FDC |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00864F27 |
0_2_00864F27 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007B8FD6 |
0_2_007B8FD6 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00814F31 |
0_2_00814F31 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008BCF37 |
0_2_008BCF37 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007CCFAD |
0_2_007CCFAD |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008C0F5A |
0_2_008C0F5A |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008FAF51 |
0_2_008FAF51 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007C9074 |
0_2_007C9074 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00819096 |
0_2_00819096 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007BD053 |
0_2_007BD053 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008E70B8 |
0_2_008E70B8 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008F90B1 |
0_2_008F90B1 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008130C3 |
0_2_008130C3 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008830CB |
0_2_008830CB |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007EB01E |
0_2_007EB01E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008E500D |
0_2_008E500D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0085B011 |
0_2_0085B011 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008D904D |
0_2_008D904D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007E50BB |
0_2_007E50BB |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008B9043 |
0_2_008B9043 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008D3045 |
0_2_008D3045 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0083F054 |
0_2_0083F054 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008F7057 |
0_2_008F7057 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00893050 |
0_2_00893050 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008EB050 |
0_2_008EB050 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008A106B |
0_2_008A106B |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007E309D |
0_2_007E309D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007ED09A |
0_2_007ED09A |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008A706D |
0_2_008A706D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007DF172 |
0_2_007DF172 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008C319C |
0_2_008C319C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007F916D |
0_2_007F916D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008A3194 |
0_2_008A3194 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0089F1AC |
0_2_0089F1AC |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_007EB14E |
0_2_007EB14E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008711B7 |
0_2_008711B7 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008251B4 |
0_2_008251B4 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008451C3 |
0_2_008451C3 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_008BF1C3 |
0_2_008BF1C3 |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 7AE0A2 second address: 7AE0AD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jo 00007FA4392209E6h 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 7AE0AD second address: 7AD8C1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA438C9B23Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jnl 00007FA438C9B23Ch 0x00000010 pushad 0x00000011 pushad 0x00000012 popad 0x00000013 push ebx 0x00000014 pop ebx 0x00000015 popad 0x00000016 nop 0x00000017 stc 0x00000018 clc 0x00000019 push dword ptr [ebp+122D01E9h] 0x0000001f sub dword ptr [ebp+122D192Eh], edx 0x00000025 add dword ptr [ebp+122D192Eh], edx 0x0000002b call dword ptr [ebp+122D2A1Ah] 0x00000031 pushad 0x00000032 sub dword ptr [ebp+122D1965h], edi 0x00000038 je 00007FA438C9B242h 0x0000003e jno 00007FA438C9B23Ch 0x00000044 xor eax, eax 0x00000046 mov dword ptr [ebp+122D1965h], edx 0x0000004c stc 0x0000004d mov edx, dword ptr [esp+28h] 0x00000051 xor dword ptr [ebp+122D1965h], edx 0x00000057 mov dword ptr [ebp+122D352Bh], eax 0x0000005d mov dword ptr [ebp+122D1965h], edi 0x00000063 mov esi, 0000003Ch 0x00000068 jmp 00007FA438C9B249h 0x0000006d or dword ptr [ebp+122D2A57h], esi 0x00000073 add esi, dword ptr [esp+24h] 0x00000077 mov dword ptr [ebp+122D1965h], edi 0x0000007d lodsw 0x0000007f stc 0x00000080 add eax, dword ptr [esp+24h] 0x00000084 sub dword ptr [ebp+122D1B33h], ecx 0x0000008a sub dword ptr [ebp+122D1910h], esi 0x00000090 mov ebx, dword ptr [esp+24h] 0x00000094 sub dword ptr [ebp+122D2A57h], edx 0x0000009a nop 0x0000009b pushad 0x0000009c push eax 0x0000009d push edx 0x0000009e pushad 0x0000009f popad 0x000000a0 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 7AD8C1 second address: 7AD8CB instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 7AD8CB second address: 7AD8F2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jno 00007FA438C9B24Dh 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 92D774 second address: 92D778 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 92D778 second address: 92D78D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA438C9B241h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 92D78D second address: 92D79F instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 jnp 00007FA4392209E6h 0x00000009 pop ecx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 push esi 0x00000011 pop esi 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 92D79F second address: 92D7B6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jnl 00007FA438C9B241h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 92D7B6 second address: 92D7BC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 92D7BC second address: 92D7C0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 920CA4 second address: 920CB7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007FA4392209EEh 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 920CB7 second address: 920CDF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jp 00007FA438C9B236h 0x00000009 push edi 0x0000000a pop edi 0x0000000b pushad 0x0000000c popad 0x0000000d popad 0x0000000e pop edx 0x0000000f pop eax 0x00000010 pushad 0x00000011 jno 00007FA438C9B242h 0x00000017 pushad 0x00000018 push eax 0x00000019 pop eax 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 92CA8C second address: 92CAA0 instructions: 0x00000000 rdtsc 0x00000002 je 00007FA4392209EEh 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 92CAA0 second address: 92CAB9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA438C9B245h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 92CC23 second address: 92CC27 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 92CC27 second address: 92CC58 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA438C9B245h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push ebx 0x0000000c pushad 0x0000000d popad 0x0000000e jne 00007FA438C9B236h 0x00000014 pop ebx 0x00000015 push eax 0x00000016 push edx 0x00000017 jmp 00007FA438C9B23Ah 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 92D084 second address: 92D088 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 92D088 second address: 92D098 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push esi 0x00000009 pop esi 0x0000000a ja 00007FA438C9B236h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 92FE54 second address: 92FEC8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4392209EAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jmp 00007FA4392209F8h 0x0000000f nop 0x00000010 push 00000000h 0x00000012 push esi 0x00000013 call 00007FA4392209E8h 0x00000018 pop esi 0x00000019 mov dword ptr [esp+04h], esi 0x0000001d add dword ptr [esp+04h], 0000001Ch 0x00000025 inc esi 0x00000026 push esi 0x00000027 ret 0x00000028 pop esi 0x00000029 ret 0x0000002a mov esi, dword ptr [ebp+122D3593h] 0x00000030 push 00000000h 0x00000032 jnc 00007FA4392209E8h 0x00000038 push 007E7773h 0x0000003d push edx 0x0000003e push eax 0x0000003f push edx 0x00000040 jmp 00007FA4392209F0h 0x00000045 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 93006A second address: 93009C instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 jg 00007FA438C9B236h 0x00000009 pop esi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov eax, dword ptr [esp+04h] 0x00000010 push edx 0x00000011 push edi 0x00000012 jl 00007FA438C9B236h 0x00000018 pop edi 0x00000019 pop edx 0x0000001a mov eax, dword ptr [eax] 0x0000001c jmp 00007FA438C9B23Ch 0x00000021 mov dword ptr [esp+04h], eax 0x00000025 push eax 0x00000026 push edx 0x00000027 push eax 0x00000028 push ebx 0x00000029 pop ebx 0x0000002a pop eax 0x0000002b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 93009C second address: 93015B instructions: 0x00000000 rdtsc 0x00000002 je 00007FA4392209F8h 0x00000008 jmp 00007FA4392209F2h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pop eax 0x00000010 push 00000000h 0x00000012 push esi 0x00000013 call 00007FA4392209E8h 0x00000018 pop esi 0x00000019 mov dword ptr [esp+04h], esi 0x0000001d add dword ptr [esp+04h], 00000014h 0x00000025 inc esi 0x00000026 push esi 0x00000027 ret 0x00000028 pop esi 0x00000029 ret 0x0000002a xor dword ptr [ebp+122D1A2Fh], esi 0x00000030 push 00000003h 0x00000032 push 00000000h 0x00000034 push edx 0x00000035 call 00007FA4392209E8h 0x0000003a pop edx 0x0000003b mov dword ptr [esp+04h], edx 0x0000003f add dword ptr [esp+04h], 00000016h 0x00000047 inc edx 0x00000048 push edx 0x00000049 ret 0x0000004a pop edx 0x0000004b ret 0x0000004c push 00000000h 0x0000004e push 00000003h 0x00000050 call 00007FA4392209E9h 0x00000055 jnl 00007FA4392209F2h 0x0000005b push eax 0x0000005c jl 00007FA4392209F4h 0x00000062 jmp 00007FA4392209EEh 0x00000067 mov eax, dword ptr [esp+04h] 0x0000006b jmp 00007FA4392209EEh 0x00000070 mov eax, dword ptr [eax] 0x00000072 jmp 00007FA4392209EEh 0x00000077 mov dword ptr [esp+04h], eax 0x0000007b push eax 0x0000007c push edx 0x0000007d push eax 0x0000007e push edx 0x0000007f push edi 0x00000080 pop edi 0x00000081 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 93015B second address: 930165 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FA438C9B236h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9301F4 second address: 93025B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4392209F7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], eax 0x0000000c jmp 00007FA4392209F4h 0x00000011 mov ecx, 275D9DAAh 0x00000016 push 00000000h 0x00000018 jmp 00007FA4392209EDh 0x0000001d pushad 0x0000001e jne 00007FA4392209E6h 0x00000024 mov ax, bx 0x00000027 popad 0x00000028 push 7B973D73h 0x0000002d push esi 0x0000002e push eax 0x0000002f push edx 0x00000030 jmp 00007FA4392209EEh 0x00000035 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 93025B second address: 9302B8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop esi 0x00000007 xor dword ptr [esp], 7B973DF3h 0x0000000e pushad 0x0000000f mov dword ptr [ebp+12455CEBh], eax 0x00000015 mov dword ptr [ebp+122D17E8h], ebx 0x0000001b popad 0x0000001c push 00000003h 0x0000001e mov dword ptr [ebp+122D1A2Fh], ebx 0x00000024 push 00000000h 0x00000026 push 00000000h 0x00000028 push edx 0x00000029 call 00007FA438C9B238h 0x0000002e pop edx 0x0000002f mov dword ptr [esp+04h], edx 0x00000033 add dword ptr [esp+04h], 00000017h 0x0000003b inc edx 0x0000003c push edx 0x0000003d ret 0x0000003e pop edx 0x0000003f ret 0x00000040 or dword ptr [ebp+122D186Fh], esi 0x00000046 clc 0x00000047 push 00000003h 0x00000049 mov cx, 70B7h 0x0000004d push 77D5FE2Dh 0x00000052 push ecx 0x00000053 pushad 0x00000054 pushad 0x00000055 popad 0x00000056 push eax 0x00000057 push edx 0x00000058 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9302B8 second address: 93031B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop ecx 0x00000006 add dword ptr [esp], 482A01D3h 0x0000000d sub dword ptr [ebp+122D186Fh], ebx 0x00000013 jno 00007FA4392209F7h 0x00000019 lea ebx, dword ptr [ebp+12455D3Fh] 0x0000001f sub dword ptr [ebp+122D2BD9h], eax 0x00000025 mov esi, dword ptr [ebp+122D36F3h] 0x0000002b xchg eax, ebx 0x0000002c push esi 0x0000002d jmp 00007FA4392209F0h 0x00000032 pop esi 0x00000033 push eax 0x00000034 push eax 0x00000035 push edx 0x00000036 jmp 00007FA4392209F1h 0x0000003b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 925C83 second address: 925C9D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA438C9B244h 0x00000007 push edi 0x00000008 pop edi 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 94D88C second address: 94D890 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 94D890 second address: 94D8CE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA438C9B246h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FA438C9B23Dh 0x00000010 jmp 00007FA438C9B245h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 94D8CE second address: 94D8E1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007FA4392209EDh 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 94D8E1 second address: 94D8E5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 94DC9E second address: 94DCB5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA4392209F3h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 94DCB5 second address: 94DCBF instructions: 0x00000000 rdtsc 0x00000002 jnl 00007FA438C9B236h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 94E11E second address: 94E143 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4392209F8h 0x00000007 pushad 0x00000008 jbe 00007FA4392209E6h 0x0000000e pushad 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 94E2CD second address: 94E2D7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 94E2D7 second address: 94E2E4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 jne 00007FA4392209E6h 0x0000000c pop eax 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 94E2E4 second address: 94E2E9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 94E489 second address: 94E493 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007FA4392209E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 94E493 second address: 94E4A1 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 jne 00007FA438C9B236h 0x00000009 pop esi 0x0000000a push eax 0x0000000b push edx 0x0000000c push edx 0x0000000d pop edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 94E4A1 second address: 94E4A7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 94E5CA second address: 94E5E1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jl 00007FA438C9B236h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pop edi 0x0000000d push eax 0x0000000e push edx 0x0000000f jg 00007FA438C9B238h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 94E8F7 second address: 94E8FC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 94E8FC second address: 94E90C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 pop eax 0x00000005 push edi 0x00000006 pop edi 0x00000007 push edx 0x00000008 pop edx 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e push ebx 0x0000000f pop ebx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 94EA93 second address: 94EA97 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 94EA97 second address: 94EAA3 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FA438C9B236h 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 94EAA3 second address: 94EAA9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 91D7AE second address: 91D7B3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 94EC03 second address: 94EC1D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FA4392209F3h 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 94F24A second address: 94F24E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 94F24E second address: 94F258 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007FA4392209E6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 94F57D second address: 94F583 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 94F583 second address: 94F589 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 924202 second address: 924217 instructions: 0x00000000 rdtsc 0x00000002 jno 00007FA438C9B236h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d ja 00007FA438C9B238h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 924217 second address: 92421D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 92421D second address: 924221 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 91F24D second address: 91F253 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 91F253 second address: 91F257 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 91F257 second address: 91F25B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 958609 second address: 95860E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 958750 second address: 958770 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FA4392209F5h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 958770 second address: 9587B0 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 jno 00007FA438C9B236h 0x00000009 pop esi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov eax, dword ptr [esp+04h] 0x00000010 jmp 00007FA438C9B248h 0x00000015 mov eax, dword ptr [eax] 0x00000017 jmp 00007FA438C9B23Dh 0x0000001c mov dword ptr [esp+04h], eax 0x00000020 push ebx 0x00000021 push eax 0x00000022 push edx 0x00000023 push eax 0x00000024 push edx 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9587B0 second address: 9587B4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 95752A second address: 95752E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9227B6 second address: 9227D0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4392209F6h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 922797 second address: 9227B6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007FA438C9B244h 0x0000000c push eax 0x0000000d push edx 0x0000000e push ebx 0x0000000f pop ebx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 95D003 second address: 95D04C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007FA4392209F5h 0x0000000a jg 00007FA4392209EAh 0x00000010 popad 0x00000011 push eax 0x00000012 push edx 0x00000013 jo 00007FA4392209ECh 0x00000019 jne 00007FA4392209E6h 0x0000001f jmp 00007FA4392209F6h 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 95D04C second address: 95D056 instructions: 0x00000000 rdtsc 0x00000002 jng 00007FA438C9B23Eh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 95D182 second address: 95D188 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 95D188 second address: 95D1A0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 jmp 00007FA438C9B242h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 95D1A0 second address: 95D1A4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 96095D second address: 96096B instructions: 0x00000000 rdtsc 0x00000002 jp 00007FA438C9B236h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 96096B second address: 96096F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 96096F second address: 960973 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9609A9 second address: 9609B3 instructions: 0x00000000 rdtsc 0x00000002 jno 00007FA4392209E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9609B3 second address: 9609D5 instructions: 0x00000000 rdtsc 0x00000002 jng 00007FA438C9B238h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f push edx 0x00000010 jmp 00007FA438C9B241h 0x00000015 pop edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9609D5 second address: 960A08 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FA4392209F3h 0x00000008 pushad 0x00000009 popad 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d mov eax, dword ptr [esp+04h] 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007FA4392209F2h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 960A08 second address: 960A4C instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 jmp 00007FA438C9B248h 0x00000008 pop ebx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov eax, dword ptr [eax] 0x0000000d jmp 00007FA438C9B23Eh 0x00000012 mov dword ptr [esp+04h], eax 0x00000016 push eax 0x00000017 push edx 0x00000018 jmp 00007FA438C9B240h 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 960A4C second address: 960A52 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 960A52 second address: 960A78 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop eax 0x00000009 jl 00007FA438C9B23Eh 0x0000000f jnl 00007FA438C9B238h 0x00000015 call 00007FA438C9B239h 0x0000001a push eax 0x0000001b push edx 0x0000001c push eax 0x0000001d push edx 0x0000001e push ecx 0x0000001f pop ecx 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 960A78 second address: 960A7E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 960A7E second address: 960AAF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FA438C9B247h 0x00000008 push edx 0x00000009 pop edx 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e pushad 0x0000000f push edi 0x00000010 jmp 00007FA438C9B23Bh 0x00000015 pop edi 0x00000016 push ecx 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 960AAF second address: 960ABF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 popad 0x00000006 mov eax, dword ptr [esp+04h] 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e push esi 0x0000000f pop esi 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 960ABF second address: 960AC9 instructions: 0x00000000 rdtsc 0x00000002 jng 00007FA438C9B236h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 960AC9 second address: 960ACF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 960ACF second address: 960AE3 instructions: 0x00000000 rdtsc 0x00000002 jng 00007FA438C9B236h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov eax, dword ptr [eax] 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 pop edx 0x00000013 pop eax 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 960AE3 second address: 960AF7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA4392209F0h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 960F4B second address: 960F5C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA438C9B23Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 960F5C second address: 960F62 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 96113D second address: 961143 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 961143 second address: 961147 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 96161E second address: 961624 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 961624 second address: 961629 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 961629 second address: 961630 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 961630 second address: 96163C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 pushad 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 963E3F second address: 963E52 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA438C9B23Fh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 963545 second address: 963549 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 963549 second address: 96354D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 964918 second address: 96491C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 964677 second address: 96467B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 96491C second address: 96492C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a jno 00007FA4392209E6h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 96467B second address: 964681 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 96492C second address: 96493A instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jne 00007FA4392209E6h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 96493A second address: 9649AB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 nop 0x00000008 push 00000000h 0x0000000a push ebx 0x0000000b call 00007FA438C9B238h 0x00000010 pop ebx 0x00000011 mov dword ptr [esp+04h], ebx 0x00000015 add dword ptr [esp+04h], 00000015h 0x0000001d inc ebx 0x0000001e push ebx 0x0000001f ret 0x00000020 pop ebx 0x00000021 ret 0x00000022 mov esi, dword ptr [ebp+122D30D6h] 0x00000028 movsx edi, di 0x0000002b push 00000000h 0x0000002d push 00000000h 0x0000002f push ecx 0x00000030 call 00007FA438C9B238h 0x00000035 pop ecx 0x00000036 mov dword ptr [esp+04h], ecx 0x0000003a add dword ptr [esp+04h], 00000018h 0x00000042 inc ecx 0x00000043 push ecx 0x00000044 ret 0x00000045 pop ecx 0x00000046 ret 0x00000047 je 00007FA438C9B238h 0x0000004d mov esi, ecx 0x0000004f push 00000000h 0x00000051 mov edi, dword ptr [ebp+122D377Bh] 0x00000057 push eax 0x00000058 push eax 0x00000059 push edx 0x0000005a pushad 0x0000005b jns 00007FA438C9B236h 0x00000061 jns 00007FA438C9B236h 0x00000067 popad 0x00000068 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9649AB second address: 9649B1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9649B1 second address: 9649B5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9653F0 second address: 9653FA instructions: 0x00000000 rdtsc 0x00000002 jl 00007FA4392209E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 965EFB second address: 965F00 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 965C39 second address: 965C63 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jl 00007FA4392209E6h 0x00000009 jmp 00007FA4392209F4h 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 push eax 0x00000012 push ebx 0x00000013 push eax 0x00000014 push edx 0x00000015 jnp 00007FA4392209E6h 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 966AB0 second address: 966B06 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 nop 0x00000006 mov dword ptr [ebp+122D2C1Dh], ecx 0x0000000c push 00000000h 0x0000000e push 00000000h 0x00000010 push eax 0x00000011 call 00007FA438C9B238h 0x00000016 pop eax 0x00000017 mov dword ptr [esp+04h], eax 0x0000001b add dword ptr [esp+04h], 0000001Ch 0x00000023 inc eax 0x00000024 push eax 0x00000025 ret 0x00000026 pop eax 0x00000027 ret 0x00000028 push 00000000h 0x0000002a movzx esi, dx 0x0000002d xchg eax, ebx 0x0000002e jmp 00007FA438C9B245h 0x00000033 push eax 0x00000034 push eax 0x00000035 push edx 0x00000036 pushad 0x00000037 push edi 0x00000038 pop edi 0x00000039 pushad 0x0000003a popad 0x0000003b popad 0x0000003c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 96AE3E second address: 96AE59 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4392209F1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push esi 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 96AE59 second address: 96AE5D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 96AE5D second address: 96AEB5 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop esi 0x00000007 nop 0x00000008 or dword ptr [ebp+122D2400h], ebx 0x0000000e push 00000000h 0x00000010 mov dword ptr [ebp+122D3238h], esi 0x00000016 push 00000000h 0x00000018 push 00000000h 0x0000001a push ecx 0x0000001b call 00007FA4392209E8h 0x00000020 pop ecx 0x00000021 mov dword ptr [esp+04h], ecx 0x00000025 add dword ptr [esp+04h], 00000014h 0x0000002d inc ecx 0x0000002e push ecx 0x0000002f ret 0x00000030 pop ecx 0x00000031 ret 0x00000032 call 00007FA4392209F7h 0x00000037 mov ebx, 060FF57Dh 0x0000003c pop edi 0x0000003d push eax 0x0000003e push eax 0x0000003f push edx 0x00000040 push ebx 0x00000041 push ebx 0x00000042 pop ebx 0x00000043 pop ebx 0x00000044 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 96CE2D second address: 96CE97 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnp 00007FA438C9B236h 0x0000000a popad 0x0000000b popad 0x0000000c push eax 0x0000000d push ecx 0x0000000e push esi 0x0000000f push eax 0x00000010 pop eax 0x00000011 pop esi 0x00000012 pop ecx 0x00000013 nop 0x00000014 push 00000000h 0x00000016 push eax 0x00000017 call 00007FA438C9B238h 0x0000001c pop eax 0x0000001d mov dword ptr [esp+04h], eax 0x00000021 add dword ptr [esp+04h], 0000001Bh 0x00000029 inc eax 0x0000002a push eax 0x0000002b ret 0x0000002c pop eax 0x0000002d ret 0x0000002e push 00000000h 0x00000030 sub dword ptr [ebp+122D2F00h], edx 0x00000036 push 00000000h 0x00000038 push 00000000h 0x0000003a push ecx 0x0000003b call 00007FA438C9B238h 0x00000040 pop ecx 0x00000041 mov dword ptr [esp+04h], ecx 0x00000045 add dword ptr [esp+04h], 00000014h 0x0000004d inc ecx 0x0000004e push ecx 0x0000004f ret 0x00000050 pop ecx 0x00000051 ret 0x00000052 xor edi, dword ptr [ebp+122D34E7h] 0x00000058 push eax 0x00000059 push eax 0x0000005a push edx 0x0000005b push edx 0x0000005c pushad 0x0000005d popad 0x0000005e pop edx 0x0000005f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 96DF5D second address: 96DF70 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d jno 00007FA4392209E6h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 96DF70 second address: 96DF76 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 96A0C2 second address: 96A0CD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jl 00007FA4392209E6h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 96D070 second address: 96D075 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 96D13A second address: 96D140 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 96D140 second address: 96D144 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 96F12A second address: 96F130 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 96F130 second address: 96F198 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FA438C9B236h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c nop 0x0000000d jmp 00007FA438C9B241h 0x00000012 push 00000000h 0x00000014 push 00000000h 0x00000016 push ecx 0x00000017 call 00007FA438C9B238h 0x0000001c pop ecx 0x0000001d mov dword ptr [esp+04h], ecx 0x00000021 add dword ptr [esp+04h], 00000016h 0x00000029 inc ecx 0x0000002a push ecx 0x0000002b ret 0x0000002c pop ecx 0x0000002d ret 0x0000002e xor edi, dword ptr [ebp+122D35F3h] 0x00000034 push 00000000h 0x00000036 mov ebx, dword ptr [ebp+122D1C1Bh] 0x0000003c or dword ptr [ebp+124640C7h], ecx 0x00000042 xchg eax, esi 0x00000043 jmp 00007FA438C9B23Eh 0x00000048 push eax 0x00000049 push eax 0x0000004a pushad 0x0000004b push esi 0x0000004c pop esi 0x0000004d push eax 0x0000004e push edx 0x0000004f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 96E0E1 second address: 96E0FD instructions: 0x00000000 rdtsc 0x00000002 jnl 00007FA4392209E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b pushad 0x0000000c jmp 00007FA4392209ECh 0x00000011 push eax 0x00000012 push edx 0x00000013 push esi 0x00000014 pop esi 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 96E195 second address: 96E1A7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ebx 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jnl 00007FA438C9B238h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 970083 second address: 97008A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 96F33D second address: 96F373 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 jmp 00007FA438C9B249h 0x00000008 pop ebx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FA438C9B244h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 97100B second address: 9710CF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4392209EDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jp 00007FA4392209ECh 0x0000000f popad 0x00000010 mov dword ptr [esp], eax 0x00000013 sub edi, 76F6EDA2h 0x00000019 push 00000000h 0x0000001b push 00000000h 0x0000001d push esi 0x0000001e call 00007FA4392209E8h 0x00000023 pop esi 0x00000024 mov dword ptr [esp+04h], esi 0x00000028 add dword ptr [esp+04h], 00000017h 0x00000030 inc esi 0x00000031 push esi 0x00000032 ret 0x00000033 pop esi 0x00000034 ret 0x00000035 or dword ptr [ebp+122D1924h], ecx 0x0000003b push ebx 0x0000003c jne 00007FA4392209F9h 0x00000042 pop ebx 0x00000043 push 00000000h 0x00000045 push 00000000h 0x00000047 push ecx 0x00000048 call 00007FA4392209E8h 0x0000004d pop ecx 0x0000004e mov dword ptr [esp+04h], ecx 0x00000052 add dword ptr [esp+04h], 00000018h 0x0000005a inc ecx 0x0000005b push ecx 0x0000005c ret 0x0000005d pop ecx 0x0000005e ret 0x0000005f mov di, bx 0x00000062 jmp 00007FA4392209F6h 0x00000067 sub dword ptr [ebp+122D2DABh], ecx 0x0000006d xchg eax, esi 0x0000006e jo 00007FA4392209EEh 0x00000074 jnc 00007FA4392209E8h 0x0000007a push eax 0x0000007b push eax 0x0000007c push edx 0x0000007d jo 00007FA4392209E8h 0x00000083 pushad 0x00000084 popad 0x00000085 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 970228 second address: 97022C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 97022C second address: 970232 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 970232 second address: 970238 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 973F20 second address: 973F25 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 973F25 second address: 973F31 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push eax 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 972314 second address: 972318 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 972318 second address: 97232A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a je 00007FA438C9B238h 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 973169 second address: 973184 instructions: 0x00000000 rdtsc 0x00000002 ja 00007FA4392209ECh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jnl 00007FA4392209E8h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9751EF second address: 9751F3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9751F3 second address: 9751FD instructions: 0x00000000 rdtsc 0x00000002 jl 00007FA4392209E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 913880 second address: 913884 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 913884 second address: 91388C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 91388C second address: 9138B1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA438C9B23Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a jg 00007FA438C9B238h 0x00000010 jo 00007FA438C9B242h 0x00000016 jns 00007FA438C9B236h 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 989DEC second address: 989DFB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4392209EBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 989DFB second address: 989E02 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 989E02 second address: 989E0B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 98A0C6 second address: 98A0D7 instructions: 0x00000000 rdtsc 0x00000002 ja 00007FA438C9B236h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push ebx 0x0000000c pop ebx 0x0000000d pushad 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 99155E second address: 991562 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 992E39 second address: 992E3D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 992E3D second address: 992E41 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 992E41 second address: 992E54 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a jc 00007FA438C9B236h 0x00000010 push edx 0x00000011 pop edx 0x00000012 popad 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 992E54 second address: 992E6A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4392209EAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [esp+04h] 0x0000000d push ecx 0x0000000e push ebx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 992E6A second address: 992E98 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pop ecx 0x00000006 mov eax, dword ptr [eax] 0x00000008 push ecx 0x00000009 jnl 00007FA438C9B238h 0x0000000f pop ecx 0x00000010 mov dword ptr [esp+04h], eax 0x00000014 pushad 0x00000015 push eax 0x00000016 push edx 0x00000017 jmp 00007FA438C9B245h 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 992E98 second address: 992EB1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4392209F2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 992F4D second address: 992F6A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FA438C9B248h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 992F6A second address: 992F9D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 jmp 00007FA4392209F6h 0x0000000d mov eax, dword ptr [esp+04h] 0x00000011 pushad 0x00000012 js 00007FA4392209E8h 0x00000018 pushad 0x00000019 popad 0x0000001a push eax 0x0000001b push edx 0x0000001c js 00007FA4392209E6h 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 992F9D second address: 992FD0 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov eax, dword ptr [eax] 0x00000009 jmp 00007FA438C9B248h 0x0000000e mov dword ptr [esp+04h], eax 0x00000012 push eax 0x00000013 push edx 0x00000014 jns 00007FA438C9B23Ch 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 992FD0 second address: 992FD6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 992FD6 second address: 992FDA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 99312A second address: 993162 instructions: 0x00000000 rdtsc 0x00000002 je 00007FA4392209F7h 0x00000008 jmp 00007FA4392209F1h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f mov dword ptr [esp+04h], eax 0x00000013 pushad 0x00000014 pushad 0x00000015 jnc 00007FA4392209E6h 0x0000001b jmp 00007FA4392209EDh 0x00000020 popad 0x00000021 push ecx 0x00000022 push eax 0x00000023 push edx 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 993162 second address: 7AD8C1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 popad 0x00000006 pop eax 0x00000007 cld 0x00000008 push dword ptr [ebp+122D01E9h] 0x0000000e jmp 00007FA438C9B244h 0x00000013 call dword ptr [ebp+122D2A1Ah] 0x00000019 pushad 0x0000001a sub dword ptr [ebp+122D1965h], edi 0x00000020 je 00007FA438C9B242h 0x00000026 jno 00007FA438C9B23Ch 0x0000002c xor eax, eax 0x0000002e mov dword ptr [ebp+122D1965h], edx 0x00000034 stc 0x00000035 mov edx, dword ptr [esp+28h] 0x00000039 xor dword ptr [ebp+122D1965h], edx 0x0000003f mov dword ptr [ebp+122D352Bh], eax 0x00000045 mov dword ptr [ebp+122D1965h], edi 0x0000004b mov esi, 0000003Ch 0x00000050 jmp 00007FA438C9B249h 0x00000055 or dword ptr [ebp+122D2A57h], esi 0x0000005b add esi, dword ptr [esp+24h] 0x0000005f mov dword ptr [ebp+122D1965h], edi 0x00000065 lodsw 0x00000067 stc 0x00000068 add eax, dword ptr [esp+24h] 0x0000006c sub dword ptr [ebp+122D1B33h], ecx 0x00000072 sub dword ptr [ebp+122D1910h], esi 0x00000078 mov ebx, dword ptr [esp+24h] 0x0000007c sub dword ptr [ebp+122D2A57h], edx 0x00000082 nop 0x00000083 pushad 0x00000084 push eax 0x00000085 push edx 0x00000086 pushad 0x00000087 popad 0x00000088 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 996EB9 second address: 996EBF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9973F4 second address: 997406 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 pushad 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a jne 00007FA438C9B236h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 99756F second address: 99758C instructions: 0x00000000 rdtsc 0x00000002 jne 00007FA4392209E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push edi 0x0000000c pop edi 0x0000000d pushad 0x0000000e popad 0x0000000f jmp 00007FA4392209EDh 0x00000014 popad 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9976AF second address: 9976B5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9976B5 second address: 9976C3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push edx 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9976C3 second address: 9976C7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9976C7 second address: 9976CB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9976CB second address: 9976D1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9976D1 second address: 9976F1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 push esi 0x00000006 pop esi 0x00000007 jnc 00007FA4392209E6h 0x0000000d push eax 0x0000000e pop eax 0x0000000f popad 0x00000010 ja 00007FA4392209E8h 0x00000016 pushad 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a push eax 0x0000001b push edx 0x0000001c push edi 0x0000001d push eax 0x0000001e pop eax 0x0000001f pop edi 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9976F1 second address: 9976FB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jl 00007FA438C9B236h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 997971 second address: 997977 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 997977 second address: 997994 instructions: 0x00000000 rdtsc 0x00000002 jng 00007FA438C9B238h 0x00000008 jnl 00007FA438C9B238h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push ebx 0x00000011 push eax 0x00000012 push edx 0x00000013 jnp 00007FA438C9B236h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 997AFE second address: 997B39 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FA4392209E6h 0x00000008 push eax 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push esi 0x0000000d jnl 00007FA4392209E6h 0x00000013 pop esi 0x00000014 jne 00007FA4392209E8h 0x0000001a push ebx 0x0000001b pop ebx 0x0000001c popad 0x0000001d push ebx 0x0000001e jmp 00007FA4392209F8h 0x00000023 pushad 0x00000024 push eax 0x00000025 pop eax 0x00000026 push eax 0x00000027 push edx 0x00000028 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 997B39 second address: 997B3F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 997E1C second address: 997E20 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 99D874 second address: 99D88E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007FA438C9B23Fh 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 99D88E second address: 99D892 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 99D892 second address: 99D89E instructions: 0x00000000 rdtsc 0x00000002 jng 00007FA438C9B236h 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 99C336 second address: 99C348 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jns 00007FA4392209E6h 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 99C348 second address: 99C34E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 99C34E second address: 99C358 instructions: 0x00000000 rdtsc 0x00000002 ja 00007FA4392209ECh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 99C4F3 second address: 99C51A instructions: 0x00000000 rdtsc 0x00000002 jc 00007FA438C9B236h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push ecx 0x0000000d pop ecx 0x0000000e jmp 00007FA438C9B249h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 99C51A second address: 99C520 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 99C661 second address: 99C667 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 99C7B7 second address: 99C7E1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4392209EAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push ecx 0x0000000a jmp 00007FA4392209F7h 0x0000000f push eax 0x00000010 push edx 0x00000011 push edx 0x00000012 pop edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 99C7E1 second address: 99C7E5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 99C942 second address: 99C964 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 popad 0x00000006 push ebx 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007FA4392209F7h 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 99C964 second address: 99C968 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 99CAAE second address: 99CABA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 99CABA second address: 99CAC4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007FA438C9B236h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 99CAC4 second address: 99CADD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4392209F3h 0x00000007 push eax 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 99CADD second address: 99CAE2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 99CC15 second address: 99CC3D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4392209F7h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop ebx 0x0000000c pushad 0x0000000d pushad 0x0000000e jp 00007FA4392209E6h 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 99CC3D second address: 99CC5B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA438C9B23Ch 0x00000009 popad 0x0000000a pushad 0x0000000b jo 00007FA438C9B236h 0x00000011 pushad 0x00000012 popad 0x00000013 popad 0x00000014 pushad 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 99CDF0 second address: 99CDF4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 99CDF4 second address: 99CDF8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 99CDF8 second address: 99CDFE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 99CF43 second address: 99CF4D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007FA438C9B236h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 99CF4D second address: 99CF66 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FA4392209FBh 0x00000008 jmp 00007FA4392209EFh 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 99D232 second address: 99D23A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 99D23A second address: 99D24D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push ecx 0x00000006 pushad 0x00000007 popad 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a pop ecx 0x0000000b push eax 0x0000000c push edx 0x0000000d js 00007FA4392209E6h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 99BEA5 second address: 99BEC0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnp 00007FA438C9B236h 0x0000000a pushad 0x0000000b popad 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f jc 00007FA438C9B236h 0x00000015 jnc 00007FA438C9B236h 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9A8C91 second address: 9A8C95 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9A7A74 second address: 9A7A8C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jng 00007FA438C9B236h 0x0000000d pushad 0x0000000e popad 0x0000000f pushad 0x00000010 popad 0x00000011 jg 00007FA438C9B236h 0x00000017 popad 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9ACC5C second address: 9ACC62 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9ACC62 second address: 9ACC8D instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FA438C9B249h 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 jl 00007FA438C9B236h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9ACC8D second address: 9ACC93 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 95DCAA second address: 95DCB0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 95DCB0 second address: 95DCB7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 95E210 second address: 95E229 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA438C9B245h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 95E229 second address: 95E24F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4392209F5h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 jne 00007FA4392209E6h 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 95E24F second address: 95E255 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 95E255 second address: 7AD8C1 instructions: 0x00000000 rdtsc 0x00000002 jne 00007FA4392209FBh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a nop 0x0000000b or dword ptr [ebp+122D2C21h], edi 0x00000011 push dword ptr [ebp+122D01E9h] 0x00000017 push 00000000h 0x00000019 push edx 0x0000001a call 00007FA4392209E8h 0x0000001f pop edx 0x00000020 mov dword ptr [esp+04h], edx 0x00000024 add dword ptr [esp+04h], 0000001Dh 0x0000002c inc edx 0x0000002d push edx 0x0000002e ret 0x0000002f pop edx 0x00000030 ret 0x00000031 call dword ptr [ebp+122D2A1Ah] 0x00000037 pushad 0x00000038 sub dword ptr [ebp+122D1965h], edi 0x0000003e je 00007FA4392209F2h 0x00000044 jno 00007FA4392209ECh 0x0000004a xor eax, eax 0x0000004c mov dword ptr [ebp+122D1965h], edx 0x00000052 stc 0x00000053 mov edx, dword ptr [esp+28h] 0x00000057 xor dword ptr [ebp+122D1965h], edx 0x0000005d mov dword ptr [ebp+122D352Bh], eax 0x00000063 mov dword ptr [ebp+122D1965h], edi 0x00000069 mov esi, 0000003Ch 0x0000006e jmp 00007FA4392209F9h 0x00000073 or dword ptr [ebp+122D2A57h], esi 0x00000079 add esi, dword ptr [esp+24h] 0x0000007d mov dword ptr [ebp+122D1965h], edi 0x00000083 lodsw 0x00000085 stc 0x00000086 add eax, dword ptr [esp+24h] 0x0000008a sub dword ptr [ebp+122D1B33h], ecx 0x00000090 sub dword ptr [ebp+122D1910h], esi 0x00000096 mov ebx, dword ptr [esp+24h] 0x0000009a sub dword ptr [ebp+122D2A57h], edx 0x000000a0 nop 0x000000a1 pushad 0x000000a2 push eax 0x000000a3 push edx 0x000000a4 pushad 0x000000a5 popad 0x000000a6 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 95E4DB second address: 95E4DF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 95E86E second address: 95E8E0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4392209F1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a mov dword ptr [esp], eax 0x0000000d ja 00007FA4392209ECh 0x00000013 push 00000004h 0x00000015 push 00000000h 0x00000017 push edi 0x00000018 call 00007FA4392209E8h 0x0000001d pop edi 0x0000001e mov dword ptr [esp+04h], edi 0x00000022 add dword ptr [esp+04h], 0000001Bh 0x0000002a inc edi 0x0000002b push edi 0x0000002c ret 0x0000002d pop edi 0x0000002e ret 0x0000002f call 00007FA4392209EAh 0x00000034 mov dword ptr [ebp+122D1965h], ebx 0x0000003a pop edx 0x0000003b push eax 0x0000003c push eax 0x0000003d push edx 0x0000003e pushad 0x0000003f jmp 00007FA4392209F0h 0x00000044 pushad 0x00000045 popad 0x00000046 popad 0x00000047 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 95E8E0 second address: 95E8E6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 95E8E6 second address: 95E8EA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 95EE72 second address: 95EE7C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnc 00007FA438C9B236h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9AD24E second address: 9AD254 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9AD254 second address: 9AD258 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9AD258 second address: 9AD290 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4392209F5h 0x00000007 js 00007FA4392209E6h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f jmp 00007FA4392209F6h 0x00000014 push ebx 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9AD290 second address: 9AD2B3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pushad 0x00000006 push ebx 0x00000007 pop ebx 0x00000008 jmp 00007FA438C9B249h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9AD804 second address: 9AD822 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007FA4392209EEh 0x0000000a pop ebx 0x0000000b pushad 0x0000000c push esi 0x0000000d jne 00007FA4392209E6h 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9AD822 second address: 9AD836 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pushad 0x00000006 push edi 0x00000007 pop edi 0x00000008 je 00007FA438C9B236h 0x0000000e popad 0x0000000f pushad 0x00000010 pushad 0x00000011 popad 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9B0AB2 second address: 9B0AB6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9B35CB second address: 9B35D0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9B384B second address: 9B384F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9B384F second address: 9B3861 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA438C9B23Ch 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9B3A03 second address: 9B3A09 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9BA1CB second address: 9BA1F6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 ja 00007FA438C9B253h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9B8C80 second address: 9B8C8E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 js 00007FA4392209E6h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9B8C8E second address: 9B8CAD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA438C9B249h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9B8CAD second address: 9B8CB2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9B8CB2 second address: 9B8CB9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9B8CB9 second address: 9B8CBF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 95EA93 second address: 95EB1C instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ebx 0x00000007 mov dword ptr [esp], eax 0x0000000a push 00000000h 0x0000000c push eax 0x0000000d call 00007FA438C9B238h 0x00000012 pop eax 0x00000013 mov dword ptr [esp+04h], eax 0x00000017 add dword ptr [esp+04h], 00000019h 0x0000001f inc eax 0x00000020 push eax 0x00000021 ret 0x00000022 pop eax 0x00000023 ret 0x00000024 mov edi, dword ptr [ebp+122D17EDh] 0x0000002a mov ebx, dword ptr [ebp+12483A8Dh] 0x00000030 push 00000000h 0x00000032 push edx 0x00000033 call 00007FA438C9B238h 0x00000038 pop edx 0x00000039 mov dword ptr [esp+04h], edx 0x0000003d add dword ptr [esp+04h], 00000016h 0x00000045 inc edx 0x00000046 push edx 0x00000047 ret 0x00000048 pop edx 0x00000049 ret 0x0000004a mov ecx, dword ptr [ebp+122D37D3h] 0x00000050 add eax, ebx 0x00000052 push 00000000h 0x00000054 push ecx 0x00000055 call 00007FA438C9B238h 0x0000005a pop ecx 0x0000005b mov dword ptr [esp+04h], ecx 0x0000005f add dword ptr [esp+04h], 00000015h 0x00000067 inc ecx 0x00000068 push ecx 0x00000069 ret 0x0000006a pop ecx 0x0000006b ret 0x0000006c nop 0x0000006d push eax 0x0000006e push edx 0x0000006f jns 00007FA438C9B23Ch 0x00000075 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 95EB1C second address: 95EB39 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4392209F3h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d push ecx 0x0000000e pop ecx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9BDC2B second address: 9BDC34 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9BDC34 second address: 9BDC3E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007FA4392209E6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9BD66B second address: 9BD693 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop esi 0x00000007 jnl 00007FA438C9B251h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9BD693 second address: 9BD6A2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 pop eax 0x00000007 push eax 0x00000008 pop eax 0x00000009 push edi 0x0000000a pop edi 0x0000000b popad 0x0000000c push edi 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9BD6A2 second address: 9BD6B3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push edx 0x00000009 jnc 00007FA438C9B238h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9C11B4 second address: 9C11BA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9C11BA second address: 9C11BE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9C8890 second address: 9C88A3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 jg 00007FA4392209EEh 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9C88A3 second address: 9C88AC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push esi 0x00000004 pop esi 0x00000005 push edx 0x00000006 pop edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9C6BF5 second address: 9C6C10 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA4392209F5h 0x00000009 push esi 0x0000000a pop esi 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9C6E9D second address: 9C6EE6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push edx 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jmp 00007FA438C9B248h 0x0000000d jng 00007FA438C9B242h 0x00000013 popad 0x00000014 push eax 0x00000015 push edx 0x00000016 jmp 00007FA438C9B244h 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9C7A71 second address: 9C7A98 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jns 00007FA4392209E6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pop esi 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007FA4392209F8h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9C85E4 second address: 9C85EA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9D1708 second address: 9D170D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9D07CE second address: 9D07D2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9D07D2 second address: 9D080E instructions: 0x00000000 rdtsc 0x00000002 jns 00007FA4392209E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b jmp 00007FA4392209F4h 0x00000010 push ecx 0x00000011 pop ecx 0x00000012 jmp 00007FA4392209F9h 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9D080E second address: 9D0816 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9D09AE second address: 9D09C5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA4392209F1h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9D09C5 second address: 9D0A0F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop ebx 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FA438C9B245h 0x0000000d pushad 0x0000000e push ecx 0x0000000f pop ecx 0x00000010 jmp 00007FA438C9B244h 0x00000015 jmp 00007FA438C9B245h 0x0000001a popad 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9D0A0F second address: 9D0A2C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4392209F3h 0x00000007 push eax 0x00000008 push edx 0x00000009 jne 00007FA4392209E6h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9D0E40 second address: 9D0E46 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9D9BAE second address: 9D9BB7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9D9BB7 second address: 9D9BBD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9D9BBD second address: 9D9BD4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4392209F3h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9D838C second address: 9D8392 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9D8392 second address: 9D839A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9D839A second address: 9D83A6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007FA438C9B236h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9D8583 second address: 9D858F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jnc 00007FA4392209E6h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9D858F second address: 9D8593 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9D9A2E second address: 9D9A34 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9DE8B7 second address: 9DE8BD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9DE8BD second address: 9DE8CE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 jbe 00007FA4392209EAh 0x0000000d push eax 0x0000000e pop eax 0x0000000f push ecx 0x00000010 pop ecx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9DE8CE second address: 9DE8E9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA438C9B247h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9E1676 second address: 9E1680 instructions: 0x00000000 rdtsc 0x00000002 jg 00007FA4392209E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9EFDBA second address: 9EFDF1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 push ecx 0x0000000a jmp 00007FA438C9B246h 0x0000000f jmp 00007FA438C9B246h 0x00000014 pop ecx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9EFDF1 second address: 9EFE15 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4392209EFh 0x00000007 pushad 0x00000008 push edx 0x00000009 pop edx 0x0000000a jmp 00007FA4392209EEh 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9F2B2F second address: 9F2B4B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA438C9B23Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop esi 0x0000000a js 00007FA438C9B25Ah 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 pop eax 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9F2B4B second address: 9F2B4F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9F2568 second address: 9F256D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9F256D second address: 9F2573 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9F26E1 second address: 9F26F1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pushad 0x00000008 push edx 0x00000009 pop edx 0x0000000a push eax 0x0000000b pop eax 0x0000000c popad 0x0000000d push eax 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9F5DB0 second address: 9F5DC0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 jnc 00007FA4392209E6h 0x0000000c pushad 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9F5DC0 second address: 9F5DC5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9F5DC5 second address: 9F5DCA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9F5F3B second address: 9F5F5B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA438C9B245h 0x00000009 pop edx 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9F5F5B second address: 9F5F5F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: A0418D second address: A04195 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: A04195 second address: A0419F instructions: 0x00000000 rdtsc 0x00000002 jo 00007FA4392209EEh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: A08DF5 second address: A08E10 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007FA438C9B243h 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: A08FA5 second address: A08FAB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: A09126 second address: A09130 instructions: 0x00000000 rdtsc 0x00000002 jns 00007FA438C9B236h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: A09130 second address: A09153 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FA4392209F3h 0x0000000b push eax 0x0000000c push edx 0x0000000d push edi 0x0000000e pop edi 0x0000000f jnl 00007FA4392209E6h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: A09415 second address: A09419 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: A09419 second address: A0941D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: A0941D second address: A09450 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA438C9B243h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FA438C9B246h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: A09450 second address: A09454 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: A09599 second address: A095AB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007FA438C9B236h 0x0000000a popad 0x0000000b pushad 0x0000000c push edi 0x0000000d pop edi 0x0000000e push esi 0x0000000f pop esi 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: A095AB second address: A095B0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: A095B0 second address: A095B5 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: A095B5 second address: A095DF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop ecx 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jl 00007FA439220A08h 0x0000000f pushad 0x00000010 jmp 00007FA4392209F8h 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: A09733 second address: A09782 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA438C9B23Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c jnc 00007FA438C9B236h 0x00000012 pop edx 0x00000013 pushad 0x00000014 jmp 00007FA438C9B248h 0x00000019 push esi 0x0000001a pop esi 0x0000001b push edi 0x0000001c pop edi 0x0000001d popad 0x0000001e popad 0x0000001f pushad 0x00000020 jo 00007FA438C9B23Eh 0x00000026 push edi 0x00000027 pop edi 0x00000028 jne 00007FA438C9B236h 0x0000002e push eax 0x0000002f push edx 0x00000030 push eax 0x00000031 push edx 0x00000032 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: A09782 second address: A09788 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: A0A3DC second address: A0A3E0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: A0CC15 second address: A0CC2B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4392209F2h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: A10E24 second address: A10E41 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 pushad 0x00000007 popad 0x00000008 push edx 0x00000009 pop edx 0x0000000a popad 0x0000000b pop edx 0x0000000c pushad 0x0000000d jmp 00007FA438C9B23Bh 0x00000012 pushad 0x00000013 push esi 0x00000014 pop esi 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: A10E41 second address: A10E47 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: A10A06 second address: A10A23 instructions: 0x00000000 rdtsc 0x00000002 jp 00007FA438C9B24Fh 0x00000008 jmp 00007FA438C9B243h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: A1907C second address: A19083 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: A19083 second address: A19091 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 pop eax 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: A19091 second address: A1909B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007FA4392209E6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: A1909B second address: A190BC instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007FA438C9B241h 0x0000000c push edx 0x0000000d pop edx 0x0000000e jo 00007FA438C9B236h 0x00000014 popad 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: A1DB0C second address: A1DB11 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: A1F4EE second address: A1F4F5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: A1F4F5 second address: A1F4FB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: A1F4FB second address: A1F501 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: A1F367 second address: A1F384 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4392209F7h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: A218ED second address: A218F1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: A218F1 second address: A218F5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 91A310 second address: 91A314 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 91A314 second address: 91A33E instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 push edx 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 jmp 00007FA4392209EAh 0x0000000e pushad 0x0000000f popad 0x00000010 jmp 00007FA4392209F4h 0x00000015 popad 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 91A33E second address: 91A343 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: A2D65A second address: A2D665 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push esi 0x0000000a pop esi 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: A2D665 second address: A2D66B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: A3476C second address: A34775 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edi 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: A34A7F second address: A34A8F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jno 00007FA438C9B236h 0x0000000a jbe 00007FA438C9B236h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: A34C39 second address: A34C3D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: A34F09 second address: A34F0F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: A34F0F second address: A34F1A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push ebx 0x0000000a pop ebx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: A34F1A second address: A34F24 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FA438C9B236h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: A34F24 second address: A34F61 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FA439220A01h 0x00000008 jmp 00007FA4392209F5h 0x0000000d jbe 00007FA4392209E6h 0x00000013 pop edx 0x00000014 pop eax 0x00000015 push ebx 0x00000016 push eax 0x00000017 push edx 0x00000018 jmp 00007FA4392209F5h 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: A3509C second address: A350A0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: A3D570 second address: A3D57A instructions: 0x00000000 rdtsc 0x00000002 je 00007FA4392209E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: A3ED99 second address: A3EDA5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: A3EDA5 second address: A3EDA9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: A3EDA9 second address: A3EDBF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA438C9B242h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: A42502 second address: A4251E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push edi 0x00000008 push eax 0x00000009 pop eax 0x0000000a jbe 00007FA4392209E6h 0x00000010 pop edi 0x00000011 popad 0x00000012 push edx 0x00000013 pushad 0x00000014 jl 00007FA4392209E6h 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: A4251E second address: A42524 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: A3958F second address: A39599 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 popad 0x00000007 push esi 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: A39400 second address: A39429 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FA438C9B24Fh 0x00000008 pushad 0x00000009 popad 0x0000000a jmp 00007FA438C9B247h 0x0000000f pop edx 0x00000010 pop eax 0x00000011 push eax 0x00000012 push edx 0x00000013 push ebx 0x00000014 push ebx 0x00000015 pop ebx 0x00000016 pop ebx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: A39429 second address: A39448 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA4392209F9h 0x00000009 push eax 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 9637E2 second address: 9637E6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |